REACHBACK reaper_db715167 http://www.reachback.io/wiki/index.php?title=Knowledge_Center MediaWiki 1.27.1 first-letter Media Special Talk User User talk REACHBACK REACHBACK talk File File talk MediaWiki MediaWiki talk Template Template talk Help Help talk Category Category talk Property Property talk Type Type talk Form Form talk Concept Concept talk Filter Filter talk Gadget Gadget talk Gadget definition Gadget definition talk Template:Green 10 107 255 2009-06-22T12:37:39Z Al Maghi 0 Created page with '<span style="color:green">{{{1}}}</span><noinclude> [[Category:Formatting templates|{{PAGENAME}}]] </noinclude>' wikitext text/x-wiki <span style="color:green">{{{1}}}</span><noinclude> [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 5fce00bbe0789ccf092ee46ffbef5e1c16127e2f Category:Mediawiki.org Formatting templates 14 100 241 2009-06-24T00:39:38Z Al Maghi 0 Created page with '[[Category:Formatting templates]]' wikitext text/x-wiki [[Category:Formatting templates]] b0977d99bfd84d652e4508b3691eb776cf54a6dd Category:Cross-browser compatibility templates 14 102 245 2011-06-15T22:40:06Z Edokter 0 Created page with "This category lists all templates that facilitate in cross-browser CSS support. [[Category:Formatting templates]]" wikitext text/x-wiki This category lists all templates that facilitate in cross-browser CSS support. [[Category:Formatting templates]] e44d93c6a7bddb9c36f79fab0f7dadb21bbe1bf0 Template:Dummytab 10 114 271 2011-12-03T07:08:39Z Varnent 0 copy original from wikipedia wikitext text/x-wiki <noinclude><table><tr></noinclude><td style="width: {{#if:{{{tab spacing percent|}}}|{{#expr:{{{tab spacing percent}}}/2}}|1}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #A3B1BF}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td><noinclude></tr></table>{{doc|content= This template is used with {{tl|start tab}} to offset the first and last tabs from the end of the tab bar slightly. [[Category:Formatting templates]] }}</noinclude> 3bda72d47644a9d5c168c612904ba7fd70a1650b Template:Magnify icon 10 123 291 2011-12-21T08:18:45Z Varnent 0 5 revisions from [[:w:en:Template:Magnify icon]]: used by wide images tempalte wikitext text/x-wiki <div class="magnify">[[File:Magnify-clip.png|15x13px|link={{{link}}}|alt=|Enlarge]]</div><noinclude> {{documentation}} </noinclude> ec1af95c57fa159203d3904a66a4890f70f4791b Template:Pagelist 10 113 269 2012-01-07T01:05:16Z Varnent 0 full use of nspace=default wikitext text/x-wiki <includeonly>{{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{1}}}}}|{{{1}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{1}}}}}|{{{1}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{2|}}}|{{#if:{{{3|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{2}}}}}|{{{2}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{2}}}}}|{{{2}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{3|}}}|{{#if:{{{4|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{3}}}}}|{{{3}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{3}}}}}|{{{3}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{4|}}}|{{#if:{{{5|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{4}}}}}|{{{4}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{4}}}}}|{{{4}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{5|}}}|{{#if:{{{6|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{5}}}}}|{{{5}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{5}}}}}|{{{5}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{6|}}}|{{#if:{{{7|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{6}}}}}|{{{6}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{6}}}}}|{{{6}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{7|}}}|{{#if:{{{8|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{7}}}}}|{{{7}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{7}}}}}|{{{7}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{8|}}}|{{#if:{{{9|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{8}}}}}|{{{8}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{8}}}}}|{{{8}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{9|}}}|{{#if:{{{10|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{9}}}}}|{{{9}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{9}}}}}|{{{9}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{10|}}}|{{#if:{{{11|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{10}}}}}|{{{10}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{10}}}}}|{{{10}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{11|}}}|{{#if:{{{12|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{11}}}}}|{{{11}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{11}}}}}|{{{11}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{12|}}}|{{#if:{{{13|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{12}}}}}|{{{12}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{12}}}}}|{{{12}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{13|}}}|{{#if:{{{14|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{13}}}}}|{{{13}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{13}}}}}|{{{13}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{14|}}}|{{#if:{{{15|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{14}}}}}|{{{14}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{14}}}}}|{{{14}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{15|}}}|{{#if:{{{16|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{15}}}}}|{{{15}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{15}}}}}|{{{15}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{16|}}}|{{#if:{{{17|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{16}}}}}|{{{16}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{16}}}}}|{{{16}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{17|}}}|{{#if:{{{18|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{17}}}}}|{{{17}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{17}}}}}|{{{17}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{18|}}}|{{#if:{{{19|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{18}}}}}|{{{18}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{18}}}}}|{{{18}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{19|}}}|{{#if:{{{20|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{19}}}}}|{{{19}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{19}}}}}|{{{19}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{20|}}}|<nowiki> </nowiki>and {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{20}}}}}|{{{20}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{20}}}}}|{{{20}}}]]}}{{{edelim|{{{delim|}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}<!-- --></includeonly><noinclude> {{documentation}} <!-- PLEASE ADD CATEGORIES AND INTERWIKIS TO THE /doc SUBPAGE, THANKS --> </noinclude> b956a9df1246a29c44995c86ca9daee3c4830035 Template:Cartella 10 115 273 2012-02-11T12:33:20Z Varnent 0 finalize mods for no links usage wikitext text/x-wiki {| style="width:100%; margin-bottom:.5em; font-size:95%; text-align:left; padding:-2px; background:none" cellpadding="0" cellspacing="0" <!-- 1 --> | rowspan="2" nowrap="nowrap" width="1%" height="37px" valign="top" style="background:#FFF; border:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-bottom:0; padding:0; padding-right:1em; margin:0; {{border-radius|0 1em 0 0}}" | [[File:cartella_{{#switch:{{{1|}}}|blu=blu|grigio=grigia|verde=verde|viola=viola|arancione=arancione|rosso=rossa|blu}}.jpg|link=|Background]] <div style="margin-top:-31px; padding-left:12px">[[File:{{{logo|Nuvola apps kalzium.svg}}}|{{{px|22}}}px]]</div><div style="padding-left:43px; margin-top:-{{{heightpx|{{#expr:{{{px|22}}} + 4}}}}}px; font-size:130%">'''{{{titolo}}}'''</div> <!-- 2 --> | height="10px" | |- <!-- 3 --> | class="plainlinks" valign="bottom" style="border-bottom:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; text-align:center"| {{#if:{{{link|}}}|<div style="float:left; padding:0 .5em 0 .5em; {{border-radius|0 5em 0 0}} border:1px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-left:0; border-bottom:0; background:#{{#switch:{{{1|}}}|blu=ECF5FF|grigio=E3E3E3|verde=CEF2E0|viola=EAEAFF|arancione=FFE9D2|rosso=FFD1D1|ECF5FF}}; font-size:85%"> [{{fullurl:{{{link}}}|action=edit}} edit]|<div style="width:100%;">&nbsp;</div>}} </div> |- <!-- 4 --> | colspan="2" style="padding-left:.5em; padding-right:.5em; background:#FFF; border:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-top:0; border-bottom:0" | {{{contenuto}}} |- <!-- 5 --> | colspan="2" class="radius_bottom" style="background:#{{#switch:{{{1|}}}|blu=ECF5FF|grigio=E3E3E3|verde=CEF2E0|viola=EAEAFF|arancione=FFE9D2|rosso=FFD1D1|FFE9D2}}; height:8px; border:1px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}; border-right:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}; border-left:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}" | <div style="font-size:0">[[File:pix.gif|1px]]</div> |}<noinclude> {{Documentation}}</noinclude> cbf5ed0933ca88b3af094b63574c28917ef468c0 Template:Box-round 10 125 295 2012-03-13T18:21:11Z SPQRobin 0 we like i18n wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__<div style="clear: both;"></div> <div style="border: 1px solid {{{border|#99c}}};<!-- -->background: {{{titlebackground|#ccf}}};<!-- -->color: {{{titleforeground|#000}}};<!-- -->padding: .1em;<!-- -->text-align: center;<!-- -->font-weight: bold;<!-- -->font-size: 100%;<!-- -->margin-bottom: 0px;<!-- -->border-bottom: none;<!-- -->{{border-radius|1.5em 1.5em 0 0}}<!-- -->{{{titlestyle|}}};"><!-- --><span class="plainlinks" <!-- EDIT LINK PARAMETERS -->style="float:right;<!-- -->margin-bottom:.1em;<!-- -->font-size: 80%;<!-- -->padding-right: 0.5em;"><!-- --><font color="{{{titleforeground|#000000}}}">[{{fullurl:{{{editpage|{{FULLPAGENAME}}}}}|action=edit}} {{int:editsection}}]</font>&nbsp;<!-- --></span ><!-- --><h2 style="font-size:100%;font-weight:bold;border: none; margin: 0; padding:0; padding-bottom:.1em;"><font color="{{{titleforeground|#000000}}}">{{{title}}}</font></h2></div> <div style="display: block; border: 1px solid {{{border|#99c}}}; vertical-align: top; background: {{{background|#fff}}}; color: {{{foreground|#000}}}; margin-bottom: 10px; padding: .8em 1em 1em 1.3em; margin-top: 0em; {{border-radius|0 0 1.5em 1.5em}} {{{style|}}};">{{{1|{{{text|{{{content}}}}}}}}}</div> <noinclude>{{doc}}</noinclude> 1dcefd534a80e840f0eeb69bfa4b352fd3d0b1d5 Template:CompactTOC8 10 119 281 2012-04-01T10:05:30Z Abani79 0 +lang tmp wikitext text/x-wiki {|<!--======================================================= -- Template CompactTOC8 - (see NOTES at bottom) --======================================================= -- --> id="toc" class="toc" summary="Contents" {{ <!-- ----------------------------------- Check center/right--> #ifeq:{{{center|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|align="center"|}}{{#ifeq:{{{right|}}}|yes|align="right"|}} {{ <!--see NOTE I3 below--> <!-- ----------------------------------- Check name/side--> #ifeq:{{{name|}}}|no||! {{{name|{{MediaWiki:Toc}}}}}{{#ifeq:{{{side|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|&#58;|}} {{#ifeq:{{{side|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|{{!}}|{{!}}-}}}} |{{#ifeq:{{{nobreak|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes||<div style="text-align:{{{align|left}}};">}}{{ <!-- --------------------------------------- Check top --> #ifeq:{{{top|}}}|yes|[[#top{{!}}Top]]&nbsp;{{{sep|&nbsp;}}}|}} {{ <!-- --------------------------------------- Prefix headers-- (see NOTE P2 below) --> #if:{{{pre1|{{{preSec1|}}}}}}|[[{{{pre1link|{{{preSec1link|#{{{pre1|{{{preSec1|}}}}}}}}}}}}{{!}}{{{pre1name|{{{preSec1name|{{{pre1|{{{preSec1|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre2|{{{preSec2|}}}}}}|[[{{{pre2link|{{{preSec2link|#{{{pre2|{{{preSec2|}}}}}}}}}}}}{{!}}{{{pre2name|{{{preSec2name|{{{pre2|{{{preSec2|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre3|{{{preSec3|}}}}}}|[[{{{pre3link|{{{preSec3link|#{{{pre3|{{{preSec3|}}}}}}}}}}}}{{!}}{{{pre3name|{{{preSec3name|{{{pre3|{{{preSec3|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre4|{{{preSec4|}}}}}}|[[{{{pre4link|{{{preSec4link|#{{{pre4|{{{preSec4|}}}}}}}}}}}}{{!}}{{{pre4name|{{{preSec4name|{{{pre4|{{{preSec4|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre5|{{{preSec5|}}}}}}|[[{{{pre5link|{{{preSec5link|#{{{pre5|{{{preSec5|}}}}}}}}}}}}{{!}}{{{pre5name|{{{preSec5name|{{{pre5|{{{preSec5|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre6|{{{preSec6|}}}}}}|[[{{{pre6link|{{{preSec6link|#{{{pre6|{{{preSec6|}}}}}}}}}}}}{{!}}{{{pre6name|{{{preSec6name|{{{pre6|{{{preSec6|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre7|{{{preSec7|}}}}}}|[[{{{pre7link|{{{preSec7link|#{{{pre7|{{{preSec7|}}}}}}}}}}}}{{!}}{{{pre7name|{{{preSec7name|{{{pre7|{{{preSec7|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre8|{{{preSec8|}}}}}}|[[{{{pre8link|{{{preSec8link|#{{{pre8|{{{preSec8|}}}}}}}}}}}}{{!}}{{{pre8name|{{{preSec8name|{{{pre8|{{{preSec8|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ <!-- --------------------------------------- Check prebreak--> #if:{{{prebreak|}}}|{{{prebreak}}}}} {{ <!-- --------------------------------------- Check symbols --> #ifeq:{{{sym|}}}|yes|[[#!$@|!$@]]|}} {{ <!-- --------------------------------------- Check numbers --> #ifeq:{{{num|}}}|yes|[[#0–9|0–9]]|}} {{#ifeq:{{{symnum|}}}|yes|[[#!–9|!–9]]| <!-- --------------------------------------- List letters --> }} {{{a|[[#A|A]]}}} {{{b|[[#B|B]]}}} {{{c|[[#C|C]]}}} {{{d|[[#D|D]]}}} {{{e|[[#E|E]]}}} {{{f|[[#F|F]]}}} {{{g|[[#G|G]]}}} {{{h|[[#H|H]]}}} {{{i|[[#I|I]]}}} {{{j|[[#J|J]]}}} {{{k|[[#K|K]]}}} {{{l|[[#L|L]]}}} {{{m|[[#M|M]]}}} {{{n|[[#N|N]]}}} {{{o|[[#O|O]]}}} {{{p|[[#P|P]]}}} {{{q|[[#Q|Q]]}}} {{{r|[[#R|R]]}}} {{{s|[[#S|S]]}}} {{{t|[[#T|T]]}}} {{{u|[[#U|U]]}}} {{{v|[[#V|V]]}}} {{{w|[[#W|W]]}}} {{{x|[[#X|X]]}}} {{{y|[[#Y|Y]]}}} {{{z|[[#Z|Z]]}}} {{#ifeq:{{{nobreak|{{#ifeq:{{{1}}}|short1|yes|}}}}}|yes|&nbsp;|<br />}}{{ <!-- ------------------------------ Check after-header1 - (see NOTE C2 below) --> #if:{{{custom1|{{{Sec1|}}}}}}|[[{{{custom1link|{{{Sec1link|#{{{custom1|{{{Sec1|}}}}}}}}}}}}{{!}}{{{custom1name|{{{Sec1name|{{{custom1|{{{Sec1|}}}}}}}}}}}}]]&nbsp;|}}{{ <!-- ------------------------------ Check after-header2...--> #if:{{{custom2|{{{Sec2|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom2link|{{{Sec2link|#{{{custom2|{{{Sec2|}}}}}}}}}}}}{{!}}{{{custom2name|{{{Sec2name|{{{custom2|{{{Sec2|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom3|{{{Sec3|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom3link|{{{Sec3link|#{{{custom3|{{{Sec3|}}}}}}}}}}}}{{!}}{{{custom3name|{{{Sec3name|{{{custom3|{{{Sec3|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom4|{{{Sec4|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom4link|{{{Sec4link|#{{{custom4|{{{Sec4|}}}}}}}}}}}}{{!}}{{{custom4name|{{{Sec4name|{{{custom4|{{{Sec4|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom5|{{{Sec5|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom5link|{{{Sec5link|#{{{custom5|{{{Sec5|}}}}}}}}}}}}{{!}}{{{custom5name|{{{Sec5name|{{{custom5|{{{Sec5|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom6|{{{Sec6|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom6link|{{{Sec6link|#{{{custom6|{{{Sec6|}}}}}}}}}}}}{{!}}{{{custom6name|{{{Sec6name|{{{custom6|{{{Sec6|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom7|{{{Sec7|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom7link|{{{Sec7link|#{{{custom7|{{{Sec7|}}}}}}}}}}}}{{!}}{{{custom7name|{{{Sec7name|{{{custom7|{{{Sec7|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom8|{{{Sec8|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom8link|{{{Sec8link|#{{{custom8|{{{Sec8|}}}}}}}}}}}}{{!}}{{{custom8name|{{{Sec8name|{{{custom8|{{{Sec8|}}}}}}}}}}}}]]&nbsp;|}}{{ <!-- ---------------------------------- Check seealso--> #ifeq:{{{seealso|}}}|yes|{{{sep|&nbsp;}}} [[#See also{{!}}See also]]&nbsp;|}}{{ <!-- ---------------------------------- Check notesfirst--> #ifeq:{{{notesfirst|}}}|yes|{{{sep|&nbsp;}}} [[#Notes{{!}}Notes]]&nbsp;|}}{{ <!-- ---------------------------------- Check refs--> #ifeq:{{{refs|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|{{{sep|&nbsp;}}} [[#References{{!}}References]]&nbsp;|}}{{ <!-- ---------------------------------- Check notes--> #ifeq:{{{notes|}}}|yes|{{{sep|&nbsp;}}} [[#Notes{{!}}Notes]]&nbsp;|}}{{ <!-- ---------------------------------- Further reading--> #ifeq:{{{further|}}}|yes|{{{sep|&nbsp;}}} [[#Further reading{{!}}Further reading]]&nbsp;|}}{{ <!-- ---------------------------------- Check extlinks--> #ifeq:{{{extlinks|}}}|yes|{{{sep|&nbsp;}}} [[#External links{{!}}External links]]|}}{{ <!-- ================================== Check invalid words--> #ifeq:{{{break|x}}}|x||<br> TOC8 - Invalid parameter "break" - try "nobreak=yes". }}{{#ifeq:{{{centre|x}}}|x||<br> TOC8 - Invalid parameter "centre" - try "center=yes". }}{{#ifeq:{{{Top|x}}}|x||<br> TOC8 - Invalid parameter "Top" - try lowercase "top=yes". }}{{#ifeq:{{{ref|x}}}|x||<br> TOC8 - Invalid parameter "ref" - try "refs=yes". }}{{#ifeq:{{{Ref|x}}}|x||<br> TOC8 - Invalid parameter "Ref" - try lowercase "refs=yes". }}{{#ifeq:{{{note|x}}}|x||<br> TOC8 - Invalid parameter "note" - try "note'''s'''=yes". }}{{#ifeq:{{{ext|x}}}|x||<br> TOC8 - Invalid parameter "ext" - try "extlinks=yes". }}{{#ifeq:{{{extlink|x}}}|x||<br> TOC8 - Invalid parameter "extlink" - try "extlinks=yes". }}</div> |}__NOTOC__<noinclude> {{documentation}} <!--PLEASE ADD CATEGORIES & INTERWIKIS TO /doc PAGE, THANKS--> <!-- -- ------------------------------------------------- --NOTES: -- -- NOTE C2: Parameter "custom1=zzz" or "Sec1=zzz" shows first -- subheader "zzz" after the "0-9 A B C D...". -- -- NOTE I3: If-statements can be indented by leaving "{{" at -- end of previous line and put "#if:" on next line; -- otherwise indented lines become quote-boxes. -- -- NOTE P2: Parameter "pre1=xxx" shows first subheader "xxx" -- before the condensed "0-9 A B C..." appears. -- -- NOTE S2: Parameter "sep=&middot;" defines the separator -- string displayed between subheaders (not letters). -- It defaults to a single space, "sep=&nbsp;". -- -- NOTE V9: Coded for MediaWiki language 1.11.1 (Jan.2008); -- wiki-format now omits HTML comments on web xfer. --HISTORY: -- 10Jan09 Added parameters: sep=&middot; and prebreak=<br>. -- 10Jan09 Added parameters: 3 more custom6, custom7, custom8. -- 10Jan09 Added parameters: 3 more custom6link...custom8link. -- 10Jan09 Added parameters: 3 more custom6name...custom8name. -- 10Jan09 Added parameters: pre1, pre2, pre3... pre7, pre8. -- 10Jan09 Added parameters: pre1link, pre2link ... pre8link. -- 10Jan09 Added parameters: pre1name, pre2name ... pre8name. -- 10Jan09 Added parameters: preSec1, preSec2, ... preSec8. -- 10Jan09 Spot invalid keywords: Top/ref/Ref/note/ext etc. -- 10Jan09 Added NOTES comments to explain template coding. -- 10Jan09 Added HISTORY comments to log major changes. -- 01Jul11 Added Further reading -- [These comment lines are omitted before Internet transfer.] -- --End Template:CompactTOC8--> {{Languages}} </noinclude> 19bf5d824ad4f112de95d6e7d3418e8e479dec71 Template:S 10 106 253 2012-07-09T21:02:48Z Waldir 0 wikitext text/x-wiki <span style="text-decoration:line-through; color:#999">{{{1|striked text}}}</span><noinclude> * See also: {{tl|grey}} [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 8e444119abfd7aa3c1cdc49424b59145293dabd4 Template:Transclude 10 122 289 2012-08-22T05:18:30Z Shanmugamp7 0 Reverted 1 edit by [[Special:Contributions/76.125.160.41|76.125.160.41]] ([[User talk:76.125.160.41|talk]]). ([[w:WP:TW|TW]]) wikitext text/x-wiki {{#switch: {{NAMESPACE: {{{1}}} }} |#default = {{FULLPAGENAME: {{{1}}} }} <!-- eg "User:Foo" --> |{{ns:0}} = {{#ifeq: {{NAMESPACE: {{{1}}} }} | {{NAMESPACE: Template{{{1}}} }} | Template:{{{1}}} <!-- no leading colon, eg "Foo" --> | {{PAGENAME: {{{1}}} }} <!-- leading colon, eg ":Foo", so we want the article --> }} }}<noinclude> {{documentation}} </noinclude> d0239e71e5745cd0d4efd032cee07341e111376b Template:Red 10 108 257 2012-11-12T14:51:16Z 130.209.6.41 0 wikitext text/x-wiki <span style="color:#BA0000">{{{1}}}</span><noinclude> [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 679ceced3c067adf7b211de86ff810db7cd49c55 Template:Rellink 10 120 283 2013-06-22T06:36:08Z Krinkle 0 wikitext text/x-wiki <div class="rellink mw-tpl-rellink{{#if:{{{extraclasses|}}}|<nowiki> </nowiki>{{{extraclasses}}}}}">{{{1}}}</div><noinclude> {{documentation}} </noinclude> eb9f18d0972fa390e07dd7bbb6db1cd7ac44d352 Template:Tab 10 118 279 2014-04-06T14:09:28Z 86.135.248.121 0 wikitext text/x-wiki <includeonly>{{#if:{{{preums|}}}||<td style="width: {{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td>}}<td style="text-align: {{#if:{{{tab alignment|}}}|{{{tab alignment}}}|center}}; {{#if:{{{rounding|}}}|{{border-radius|{{{rounding}}} {{{rounding}}} 0 0}}}} padding:0.3em; border: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}; font-size: {{#if:{{{font-size|}}}|{{{font-size}}}|110%}}; {{#switch:{{FULLPAGENAME}}|{{{link}}}|{{{link2}}}|{{{link3}}}|{{{link4}}}|{{{link5}}}=background-color: {{#if:{{{on tab color|}}}|{{{on tab color}}}|transparent}}; border-bottom: none; font-weight:bold; |#default=background-color: {{#if:{{{off tab color|}}}|{{{off tab color}}}|#CEE0F2}}; }} {{#ifeq:{{lc:{{{nowrap|}}}}}|yes|white-space: nowrap;}}" width="{{#expr:(100/{{Number of defined parameters|{{{1}}}|{{{2}}}|{{{3}}}|{{{4}}}|{{{5}}}|{{{6}}}|{{{7}}}|{{{8}}}|{{{9}}}|{{{10}}}|{{{11}}}|{{{12}}}|{{{13}}}|{{{14}}}|{{{15}}}|{{{16}}}|{{{17}}}|{{{18}}}|{{{19}}}|{{{20}}}}})-{{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}}}%">{{#if:{{{image|}}}|[[file:{{{image}}}|20px|{{{tab}}}|link={{{link|}}}]]&nbsp;}}{{#ifeq:{{lc:{{{freeform|}}}}}|yes|{{{tab}}}|[[{{{link}}}|{{{tab}}}]]}}</td></includeonly><noinclude>{{documentation}}</noinclude> d7e78c5489777e489ec4a0320f35ec9c30b7c32e 606 280 2015-01-29T21:46:23Z Bclemente 0 wikitext text/x-wiki <includeonly><div class="section"><p class="title" style="font-size:small" data-section-title>{{{1}}} {{{2}}}</p> <div class="content" data-section-content>{{{3}}}</div></div></includeonly> bdbac5aa417cf964d37b3fe12d9bee93ee704407 Template:Start tab 10 116 275 2014-04-06T14:12:39Z 86.135.248.121 0 wikitext text/x-wiki <includeonly><!-- --><table width="100%" cellspacing=0 cellpadding=0 valign="top" border=0 style="background-color: transparent"><!-- --><tr><!-- -->{{dummytab|border={{{border|}}}|tab spacing percent={{{tab spacing percent|}}}}}<!-- -->{{#if:{{{tab-1|}}}|{{tab|freeform={{{freeform-1|}}}|link={{{link-1}}}|link2={{{link2-1}}}|link3={{{link3-1}}}|link4={{{link4-1}}}|link5={{{link5-1}}}|tab={{{tab-1}}}|image={{{image-1|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-1|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}|preums=1}}}}<!-- -->{{#if:{{{tab-2|}}}|{{tab|freeform={{{freeform-2|}}}|link={{{link-2}}}|link2={{{link2-2}}}|link3={{{link3-2}}}|link4={{{link4-2}}}|link5={{{link5-2}}}|tab={{{tab-2}}}|image={{{image-2|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-2|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-3|}}}|{{tab|freeform={{{freeform-3|}}}|link={{{link-3}}}|link2={{{link2-3}}}|link3={{{link3-3}}}|link4={{{link4-3}}}|link5={{{link5-3}}}|tab={{{tab-3}}}|image={{{image-3|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-3|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-4|}}}|{{tab|freeform={{{freeform-4|}}}|link={{{link-4}}}|link2={{{link2-4}}}|link3={{{link3-4}}}|link4={{{link4-4}}}|link5={{{link5-4}}}|tab={{{tab-4}}}|image={{{image-4|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-4|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-5|}}}|{{tab|freeform={{{freeform-5|}}}|link={{{link-5}}}|link2={{{link2-5}}}|link3={{{link3-5}}}|link4={{{link4-5}}}|link5={{{link5-5}}}|tab={{{tab-5}}}|image={{{image-5|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-5|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-6|}}}|{{tab|freeform={{{freeform-6|}}}|link={{{link-6}}}|link2={{{link2-6}}}|link3={{{link3-6}}}|link4={{{link4-6}}}|link5={{{link5-6}}}|tab={{{tab-6}}}|image={{{image-6|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-6|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-7|}}}|{{tab|freeform={{{freeform-7|}}}|link={{{link-7}}}|link2={{{link2-7}}}|link3={{{link3-7}}}|link4={{{link4-7}}}|link5={{{link5-7}}}|tab={{{tab-7}}}|image={{{image-7|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-7|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-8|}}}|{{tab|freeform={{{freeform-8|}}}|link={{{link-8}}}|link2={{{link2-8}}}|link3={{{link3-8}}}|link4={{{link4-8}}}|link5={{{link5-8}}}|tab={{{tab-8}}}|image={{{image-8|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-8|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-9|}}}|{{tab|freeform={{{freeform-9|}}}|link={{{link-9}}}|link2={{{link2-9}}}|link3={{{link3-9}}}|link4={{{link4-9}}}|link5={{{link5-9}}}|tab={{{tab-9}}}|image={{{image-9|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-9|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-10|}}}|{{tab|freeform={{{freeform-10|}}}|link={{{link-10}}}|link2={{{link2-10}}}|link3={{{link3-10}}}|link4={{{link4-10}}}|link5={{{link5-10}}}|tab={{{tab-10}}}|image={{{image-10|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-10|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-11|}}}|{{tab|freeform={{{freeform-11|}}}|link={{{link-11}}}|link2={{{link2-11}}}|link3={{{link3-11}}}|link4={{{link4-11}}}|link5={{{link5-11}}}|tab={{{tab-11}}}|image={{{image-11|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-1|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-12|}}}|{{tab|freeform={{{freeform-12|}}}|link={{{link-12}}}|link2={{{link2-12}}}|link3={{{link3-12}}}|link4={{{link4-12}}}|link5={{{link5-12}}}|tab={{{tab-12}}}|image={{{image-12|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-2|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-13|}}}|{{tab|freeform={{{freeform-13|}}}|link={{{link-13}}}|link2={{{link2-13}}}|link3={{{link3-13}}}|link4={{{link4-13}}}|link5={{{link5-13}}}|tab={{{tab-13}}}|image={{{image-13|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-3|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-14|}}}|{{tab|freeform={{{freeform-14|}}}|link={{{link-14}}}|link2={{{link2-14}}}|link3={{{link3-14}}}|link4={{{link4-14}}}|link5={{{link5-14}}}|tab={{{tab-14}}}|image={{{image-14|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-4|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-15|}}}|{{tab|freeform={{{freeform-15|}}}|link={{{link-15}}}|link2={{{link2-15}}}|link3={{{link3-15}}}|link4={{{link4-15}}}|link5={{{link5-15}}}|tab={{{tab-15}}}|image={{{image-15|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-5|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-16|}}}|{{tab|freeform={{{freeform-16|}}}|link={{{link-16}}}|link2={{{link2-16}}}|link3={{{link3-16}}}|link4={{{link4-16}}}|link5={{{link5-16}}}|tab={{{tab-16}}}|image={{{image-16|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-6|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-17|}}}|{{tab|freeform={{{freeform-17|}}}|link={{{link-17}}}|link2={{{link2-17}}}|link3={{{link3-17}}}|link4={{{link4-17}}}|link5={{{link5-17}}}|tab={{{tab-17}}}|image={{{image-17|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-7|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-18|}}}|{{tab|freeform={{{freeform-18|}}}|link={{{link-18}}}|link2={{{link2-18}}}|link3={{{link3-18}}}|link4={{{link4-18}}}|link5={{{link5-18}}}|tab={{{tab-18}}}|image={{{image-18|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-8|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-19|}}}|{{tab|freeform={{{freeform-19|}}}|link={{{link-19}}}|link2={{{link2-19}}}|link3={{{link3-19}}}|link4={{{link4-19}}}|link5={{{link5-19}}}|tab={{{tab-19}}}|image={{{image-19|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-9|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-20|}}}|{{tab|freeform={{{freeform-20|}}}|link={{{link-20}}}|link2={{{link2-20}}}|link3={{{link3-20}}}|link4={{{link4-20}}}|link5={{{link5-20}}}|tab={{{tab-20}}}|image={{{image-20|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-10|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{dummytab|border={{{border|}}}|tab spacing percent={{{tab spacing percent|}}}}}<!-- --></tr><!-- --></table><!-- -->{{#ifeq:{{{frame|}}}|yes|<div style="border: {{{border|solid 1px #a3b1bf}}}; padding: .5em 1em 1em 1em; border-top: none; background-color: {{{frame color|{{{on tab color|transparent}}}}}}; color: black; zoom: 1"><!-- --><div style="padding: 1ex">}}<!-- --></includeonly><!-- --><noinclude>{{documentation}}</noinclude> e76d923db135374f739db247717039ec4e689162 Template:End tab 10 117 277 2014-04-06T14:15:58Z 86.135.248.121 0 wikitext text/x-wiki <div><includeonly><!-- -->{{clear}}</div><!-- -->{{#if:{{{URL-1|}}}|<div style="float:right; margin-top: 0.0em; margin-bottom:3px; background-color: {{{Off tab color|#cee0f2}}}; padding: .2em .6em; font-size: 130%; border: {{{border|1px solid #a3b1bf}}}; {{#if:{{{rounding|}}}|-moz-border-radius: {{{rounding}}} {{{rounding}}} 0 0; border-radius: {{{rounding}}} {{{rounding}}} 0 0;}}"> Next page : {{#switch:{{FULLPAGENAME}}| {{{URL-1}}}=[[{{{URL-2|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-2|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-2}}}=[[{{{URL-3|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-3|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-3}}}=[[{{{URL-4|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-4|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-4}}}=[[{{{URL-5|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-5|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-5}}}=[[{{{URL-6|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-6|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-6}}}=[[{{{URL-7|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-7|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-7}}}=[[{{{URL-8|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-8|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-8}}}=[[{{{URL-9|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-9|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-9}}}=[[{{{URL-10|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-10|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-10}}}=[[{{{URL-End|{{{URL-1}}}}}}|'''{{{Tab-End|{{{Tab-1}}}}}}''']]| }}<span style="font-size: larger; font-weight: bold;">&rarr;</span><!-- --><div style="clear:both"></div></div>|<div style="clear:both"></div>}}</div></includeonly><noinclude>{{doc}}</noinclude> d76a781f167cc46cbbe3bf964b551218821e865e Template:Collapse bottom 10 111 265 2014-06-02T01:57:11Z Shirayuki 0 {{TNT|Documentation}} wikitext text/x-wiki |}</div><noinclude> {{TNT|Documentation}} <!-- PLEASE ADD THIS TEMPLATE'S CATEGORIES AND INTERWIKIS TO THE /doc SUBPAGE, THANKS --> </noinclude> 3e150427ef410d88db3ed21c0539f3e90ee3faab Template:Tab/sandbox 10 126 297 2014-08-13T15:39:33Z Jackmcbarn 0 mirror from [[Template:Tab]] wikitext text/x-wiki <includeonly>{{#if:{{{preums|}}}||<td style="width: {{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td>}}<td style="text-align: {{#if:{{{tab alignment|}}}|{{{tab alignment}}}|center}}; {{#if:{{{rounding|}}}|{{border-radius|{{{rounding}}} {{{rounding}}} 0 0}}}} padding:0.3em; border: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}; font-size: {{#if:{{{font-size|}}}|{{{font-size}}}|110%}}; {{#switch:{{FULLPAGENAME}}|{{{link}}}|{{{link2}}}|{{{link3}}}|{{{link4}}}|{{{link5}}}=background-color: {{#if:{{{on tab color|}}}|{{{on tab color}}}|transparent}}; border-bottom: none; font-weight:bold; |#default=background-color: {{#if:{{{off tab color|}}}|{{{off tab color}}}|#CEE0F2}}; }} {{#ifeq:{{lc:{{{nowrap|}}}}}|yes|white-space: nowrap;}}" width="{{#expr:(100/{{Number of defined parameters|{{{1}}}|{{{2}}}|{{{3}}}|{{{4}}}|{{{5}}}|{{{6}}}|{{{7}}}|{{{8}}}|{{{9}}}|{{{10}}}|{{{11}}}|{{{12}}}|{{{13}}}|{{{14}}}|{{{15}}}|{{{16}}}|{{{17}}}|{{{18}}}|{{{19}}}|{{{20}}}}})-{{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}}}%">{{#if:{{{image|}}}|[[file:{{{image}}}|20px|{{{tab}}}|link={{{link|}}}]]&nbsp;}}{{#ifeq:{{lc:{{{freeform|}}}}}|yes|{{{tab}}}|[[{{{link}}}|{{{tab}}}]]}}</td></includeonly><noinclude>{{documentation}}</noinclude> d7e78c5489777e489ec4a0320f35ec9c30b7c32e Template:Uselang 10 140 329 2014-08-30T14:25:25Z Steinsplitter 0 Protected "[[Template:Uselang]]": Highly visible template: used on [[Special:MostTranscludedPages|12,027]] pages ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite)) wikitext text/x-wiki {{#if: {{{lang|}}} | {{{lang|}}} | {{#ifeq: {{int:Lang}} | <Lang> | default | {{int:Lang}} }} }}<noinclude> {{Documentation}} </noinclude> 297a29f24992bc20bf1a8d217933907f49e263e4 Template:Smallcaps 10 128 301 2014-10-24T00:15:14Z Genium 0 Creating Template:Smallcaps wikitext text/x-wiki <includeonly><span style="font-variant: small-caps">{{{1}}}</span></includeonly><noinclude>{{documentation}}</noinclude> 96dbaf71349f4af78c01cfab7eaa8fd953fa7784 Template:TNTN 10 81 333 219 2014-10-26T15:26:18Z Steinsplitter 0 Protected "[[Template:TNTN]]": Highly visible template ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite)) wikitext text/x-wiki #REDIRECT [[Template:Translatable template name]] 51aba18c9e7edde0de5272258792895d16b983c2 Template:Documentation/sandbox 10 124 293 2014-10-29T17:15:03Z 151.225.136.51 0 wikitext text/x-wiki {{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude> ce7fd93f18c46b4fa871bf679afd05cbda72d8c4 Template:Grey 10 101 243 2014-11-19T14:44:26Z André Costa (WMSE) 0 Repairing wikitext text/x-wiki <span style="color:#999;">{{{1}}}</span><noinclude> * See also: {{tl|s}} [[Category:Formatting templates|{{PAGENAME}}]] <templatedata> { "description": "Display text in gray", "params": { "1": { "label": "Text", "description": "Text to be displayed", "type": "string", "default": "text", "suggested": true, "autovalue": "value" } } } </templatedata> </noinclude> 629dd57a007f80942599a00e027948fcedfcb97c Template:Languages/Lang 10 135 319 2014-12-15T17:35:20Z Gqqnb 0 remove useless <includeonly> wikitext text/x-wiki {{#ifexist: {{#if:{{{2|}}}|{{{2}}}|{{NAMESPACE}}:{{BASEPAGENAME}}}}/{{{1|}}} |&nbsp;• <bdi lang="{{{1|}}}">{{#if:{{{2|}}} |[[:{{{2|}}}/{{{1|}}}|{{#language:{{{1|}}}}}]] |[[:{{NAMESPACE}}:{{BASEPAGENAME}}/{{{1|}}}|{{#language:{{{1|}}}}}]] }}</bdi> }}<noinclude> {{Documentation}} </noinclude> c21fa44889712c6aa27a79bb3191f2f6e29563f4 Template:Languages/Title 10 136 321 2014-12-15T17:45:23Z Gqqnb 0 zh=語言:,what the hell only 語? wikitext text/x-wiki {{LangSwitch|lang={{{1|}}} |default=Language: |Languages=Languages: |MediaWiki=Languages: |af=Taal: |aln=Gjuha: |am=ቋምቋ፦ |an=Idioma: |ang=Sprǣc: |ar=:اللغة |arc=ܠܫܢܐ: |arn=Dungun: |arz=:اللغة |as=ভাষা: |ast=Llingua: |avk=Ava: |ay=Aru: |az=Dil: |bat-smg=Kalba: |bcc=زبان: |bcl=Tataramon: |be=Мова: |be-tarask=Мова: |bg=Език: |bn=ভাষা: |br=Yezh : |bs=Jezik: |ca=Llengua : |cdo=Ngṳ̄-ngiòng: |ce=Мотт: |ceb=Pinulongan: |ch=Lengguahe: |ckb-arab=زمان: |co=Lingua : |crh-cyrl=Тиль: |crh-latn=Til: |cs=Jazyk: |cu=ѩꙁꙑ́къ : |cv=Чĕлхе: |cy=Iaith: |da=Sprog: |de=Sprache: |diq=Zıwan: |dsb=Rěc: |ee=Gbe: |el=Γλώσσα: |en=Language: |eo=Lingvo: |es=Idioma: |et=Keel: |eu=Hizkuntza: |ext=Palra: |fa=زبان: |fi=Kieli: |fo=Mál: |fr=Langue : |frc=Langue : |frp=Lengoua : |fur=Lenghe : |fy=Taal: |ga=Teanga: |gag=Dil: |gan-hans=语言: |gan-hant=語言: |gl=Lingua: |gn=Ñe'ẽ: |got=Razda: |grc=Γλῶσσα: |gsw=Sproch: |gu=ભાષા: |gv=Çhengey: |hak=Ngî-ngièn: |haw=Kou 'ōlelo: |he=שפה: |hi=भाषा: |hif-latn=Bhasa: |hr=Jezik: |hsb=Rěč: |ht=Lang: |hu=Nyelv: |hy=Լեզու. |ia=Lingua: |id=Bahasa: |ie=Lingue: |ilo=Lengguahe: |io=Linguo: |is=Tungumál: |it=Lingua: |ja=言語: |jv=Basa: |ka=ენა: |kaa=Til: |kab=Tutlayt: |kg=Ndinga: |kiu=Zon: |kk-arab=:ٴتىل |kk-cyrl=Тіл: |kk-latn=Til: |km=ភាសា៖ |kn=ಭಾಷೆ: |ko=언어: |ksh=Sproch: |ku-latn=Ziman: |kv=Кыв: |kw=Yeth: |ky=Тил: |la=Lingua: |lb=Sprooch: |lfn=Lingua: |li=Taol: |lij=Lengoa: |loz=Zwa Siselect: |lt=Kalba: |lv=Valoda: |lzh=語: |mdf=Кяль: |mg=fiteny: |mhr=Йылме: |min=Bahaso: |mk=Јазик: |ml=ഭാഷ: |mn=Хэл: |mr=भाषा: |ms=Bahasa: |mt=Lingwa: |mwl=Lhéngua: |my=ဘာသာ: |myv=Кель: |nah=Tlahtōlli: |nap=Lengua: |nds=Spraak: |nds-nl=Taal: |ne=भाषा: |new=भाषा: |nl=Taal: |nn=Språk: |no=Språk: |nso=Polelo: |oc=Lenga : |os=Æвзаг: |pa=ਭਾਸ਼ਾ: |pam=Amanu: |pdc=Schprooch: |pdt=Sproak: |pl=Język: |pms=Lenga: |pnb=بولی: |pnt=Γλώσσαν: |prg=Bilā: |ps=ژبه: |pt|pt-br=Língua: |qu=Rimay: |rm=Lingua: |ro=Limba: |roa-tara=Lénga: |ru=Язык: |sa=भाषा: |sah=Омугун тыла: |sc=Limba: |scn=Lingua: |sco=Leid: |sdc=Linga: |se=Giella: |sei=Itom: |sh=Jezik: |shi=tutlayt: |si=භාෂාව: |sk=Jazyk: |sl=Jezik: |sli=Sproache: |so=Luqada: |sq=Gjuha: |sr-ec=Језик: |sr-el=Jezik: |srn=Tongo: |ss=Lúlwîmi: |stq=Sproake: |su=Basa: |sv=Språk: |sw=Lugha: |szl=Godka: |ta=மொழி: |te=భాష: |tet=Lian: |tg-cyrl=Забон: |th=ภาษา: |ti=ቋንቋ: |tk=Dil: |tl=Wika: |to=Lea: |tr=Dil: |tt-cyrl=Тел: |tyv=Дыл: |ug-arab=:تىل |ug-latn=Til: |uk=Мова: |vec=Lengua: |vep=Kel’: |vi=Ngôn ngữ: |vo=Pük: |vro=Kiil: |wa=Lingaedje: |war=Yinaknan: |wo=Làkk: |wuu=语言: |xal=Келн: |xh=Ulwimi: |xmf=ნინა: |yi=שפראך: |yo=Èdè: |yue=語言: |zea=Taele: |zh=語言: |zh-hans=语言: |zh-hant=語言: |zu=Ulimi: }}<noinclude>{{Documentation}}</noinclude> 9a6086fadca92393091513e283c466a398fdea1d Template:LangSwitch 10 133 315 2015-01-28T11:57:00Z 176.195.109.14 0 wikitext text/x-wiki {{{ {{#switch: {{{ {{Uselang|lang={{{lang|}}}}} |}}} | ~ = empty | = {{#switch: {{{ {{GetFallback| {{Uselang|lang={{{lang|}}}}} |default=default}} |}}} | ~ = empty | = {{#switch: {{{ {{GetFallback2| {{Uselang|lang={{{lang|}}}}} |default=default}} |}}} | ~ = empty | = {{#if: {{{default|}}} | default | en }} | #default = {{GetFallback2| {{Uselang|lang={{{lang|}}}}} |default=default}} }} | #default = {{GetFallback| {{Uselang|lang={{{lang|}}}}} |default=default}} }} | #default = {{Uselang|lang={{{lang|}}}}} }} |}}}<noinclude> {{Documentation}} </noinclude> 6276da6db4a231df3efb5b4f4a68cc35dc2b8211 Template:Elink 10 266 598 2015-01-29T00:51:20Z Bclemente 0 wikitext text/x-wiki <includeonly><span class="plainlinks">[{{{1}}} {{{2}}}]</span></includeonly> d5574cbe6609c35f82ca56241f049a823b7fdfac Property:Abstract 102 240 538 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Author 102 241 540 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Average Rating Stars 102 242 542 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Citation 102 243 544 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:DOI 102 244 546 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki [[Has type::Text]] [[Category:Framework Pages]] 793928a9cf583921e396749ebc4a0c88e2d40746 Property:Five Star Review Count 102 245 548 2015-02-05T15:20:04Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Four Star Review Count 102 246 550 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Full Title 102 49 552 73 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Item 102 247 554 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Page]]. [[Category:Framework Pages]] 35138e263c93432ca7be64f2ecdb8edf070d91e5 Property:Item Type 102 59 556 124 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] [[Allows value::article]] [[Allows value::book]] [[Allows value::booklet]] [[Allows value::conference]] [[Allows value::inbook]] [[Allows value::incollection]] [[Allows value::inproceedings]] [[Allows value::manual]] [[Allows value::mastersthesis]] [[Allows value::misc]] [[Allows value::phdthesis]] [[Allows value::proceedings]] [[Allows value::standard]] [[Allows value::techreport]] [[Allows value::unpublished]] abcd7257bbc4f8f15fdc7663c0b0f654f7b111a9 Property:Item Type Image 102 248 558 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Keyword Links 102 249 560 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:One Star Review Count 102 250 562 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Publisher 102 251 564 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Rating 102 252 566 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Number]]. [[Category:Framework Pages]] 58a20cb7fe63db16b7ea0e1b733e8a5bf9e55ac8 Property:Review Title 102 253 568 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Property:Reviewer 102 254 570 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Page]]. [[Category:Framework Pages]] 35138e263c93432ca7be64f2ecdb8edf070d91e5 Property:Sorting Title 102 255 572 2015-02-05T15:20:05Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Property:Three Star Review Count 102 256 574 2015-02-05T15:20:06Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Two Star Review Count 102 257 576 2015-02-05T15:20:06Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Volume 102 258 578 2015-02-05T15:20:06Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Year 102 259 580 2015-02-05T15:20:06Z Bclemente 0 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Template:Clear 10 129 303 2015-02-10T18:27:06Z Edokter 0 Protected "[[Template:Clear]]" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)) wikitext text/x-wiki <div style="clear:{{{1|both}}};"></div><noinclude> {{documentation}} </noinclude> 38bab3e3d7fbd3d6800d46556e60bc6bac494d72 Template:RefList 10 265 596 2015-02-21T17:22:23Z Bclemente 0 Created page with "<includeonly> '''References''' <div id="reference-block"> <references /></div></includeonly>" wikitext text/x-wiki <includeonly> '''References''' <div id="reference-block"> <references /></div></includeonly> 26237a1877fd0c09294cb2c9fc083e4a7448c9c3 Template:New Paragraph 10 62 594 132 2015-02-23T20:40:07Z Bclemente 0 wikitext text/x-wiki <includeonly> <div class="np"></div> </includeonly> 26a6db7d50ee393b0d5d7e0800bd93c8d30fdd52 Template:Blue 10 109 259 2015-02-24T03:36:29Z Shirayuki 0 wikitext text/x-wiki <noinclude> {{languages}} </noinclude><span style="color:#0645AD;">{{{1}}}</span><noinclude> [[Category:Formatting templates{{translation}}|{{PAGENAME}}]] </noinclude> 3300263cd97853e64e01cf269e5c1e5cde832838 Talk:Selecting 1 228 514 2015-02-24T17:18:52Z Bclemente 0 Created page with "[[Category:Page]]" wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Vision 0 237 532 2015-02-24T17:59:11Z Bclemente 0 Created page with "[[Category:Page]]" wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Wiki Federation 0 238 534 2015-02-24T17:59:30Z Bclemente 0 Created page with "[[Category:Page]]" wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Template:Download 10 268 602 2015-02-25T17:22:14Z Bclemente 0 wikitext text/x-wiki <includeonly> {| | style="width:100%;background:#eee3d0; font-weight:normal; font-size:80%;border: solid 1px #e0cdab;text-align:left; font-color:#000; padding:5px 5px;margin-bottom:-1px;"|[[Image:Download.png|36px|link=]] Download links and installation instructions may be found here: {{{1}}} |} </includeonly> 3a1fc8aff1d7a1df320b5a9ba2995f21b58b1568 Template:Gallery 10 269 604 2015-02-25T20:27:14Z Bclemente 0 wikitext text/x-wiki <includeonly><div style="display: inline-block;margin: 5px;"> {| |{{#widget:LinkedIn Profile |profile={{{2}}} |name={{{3}}} |norelated }} |- |[[File:Gestalt Wiki Framework.png|24px|link=]] {{{1}}} |}</div> </includeonly> 3f46729562273b5c431aef415b9292cb47da7388 Hide All Title Icons 0 219 496 2015-02-26T00:37:03Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=all}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 5d215b43cf5834c8198393b685fe8b7686067ccd Hide Page Title Icons 0 220 498 2015-02-26T00:37:14Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=page}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 0f8e3d0de4d9ec150e1db4be3d26bef072fb02c1 Hide Category Title Icon 0 221 500 2015-02-26T00:37:23Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=category}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 617f488b4cc42ab8c47c3eb09c5e4e72a0468f80 Nested Tabs 0 234 526 2015-02-26T01:17:32Z Bclemente 0 Bclemente moved page [[Case Study]] to [[Nested Tabs]] without leaving a redirect wikitext text/x-wiki <div style="font-size:80%;"> <div class="section-container auto" data-section> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Background</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework}}}} {{Tab||Background|{{:Background}}}} {{Tab||Enterprise Collaboration|{{:Enterprise Collaboration}}}} {{Tab||Content Networks|{{:Content Networks}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Design</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Development</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Configure a Wiki|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Classes|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Queries and Visualizations|[[Image:UnderConstruction.png|50px]]}} {{Tab||Patterns|[[Image:UnderConstruction.png|50px]]}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Gestalt Wiki Framework Extensions</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework Extensions}}}} {{Tab||Title Icon|{{:Title Icon}}}} {{Tab||Semantic Rating|{{:Semantic Rating}}}} {{Tab||VIKI Network Graph|{{:VIKI Network Graph}}}} {{Tab||VIKI Semantic Title|{{:VIKI Semantic Title}}}} {{Tab||VIKI Title Icon|{{:VIKI Title Icon}}}} {{Tab||Hierarchy Builder|{{:Hierarchy Builder}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>About</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Publications|{{:Publications}}}} {{Tab||Team|{{:Team}}}} {{Tab||MITRE|{{:MITRE}}}} {{Tab||Contact|{{:Contact}}}} </div></div></div> </div> __NOTOC__ {{#set:Hide Title Icon=all}} c8a0aaf4f28e87f141edba6963927368fddb3de0 Enterprise Collaboration 0 214 486 2015-02-26T18:28:04Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-8 columns">Traditionally, enterprise knowledge work business processes involve staff creating a document, spreadsheet, or briefing and then emailing it to a group for review. Each time the information container is emailed to an author, an additional copy of the resource is created. Multiple copies of the information container at different stages of the editing process is copied to each author's desktop, email queue, and/or shared folders. To bring all of the modifications into a single instance of the information container, authors need to accept and merge changes. When the group of authors is highly active, it can be very time-consuming to ensure that all changes are correctly considered, accepted, and merged. Searching through large email folders to find the most current version can also be time-consuming. A document management system can improve multi-author editing using a check in and check out process. However, over time, the hierarchical structure of the document management system can become saturated with so many items that authors find it difficult to navigate or find the information containers they need.</div> <div class="large-4 columns">[[Image:NxNAuthoring.png|400px]]<br>Emailing Knowledge Resources</div></div> <div class="row" ><div class="large-8 columns">Collaborating on a common page or set of pages in a wiki can eliminate the version control and findability problems cited above. Instead of emailing or posting the resource to a document management system, authors use a wiki to shape the resource. All edits are logged and authors can inspect the history of the page to learn how the page has changed over time and who were the authors who made the changes. There is no need to merge edits. Merge happens each time an author edits the page. Not only can these authors inspect the page history, they can also make comments or discuss the page. A structured wiki adds support to the authoring process by ensuring that authors edit the latest version and by authors embedding queries to aggregate and filter related knowledge, and display query results as tag clouds, bar charts, network graphs, faceted navigation lists, scatter plots, tree maps, geospatial maps, timelines, calendars, and more. Enterprise wiki champions have redirected their community members from email to make contributions about work in progress or the results of meetings with customers in the community wiki. Over time, these contributions can be aggregated on community member pages, projects pages, or any other related pages where a visualization would be useful. This is possible because structured wikis enable [[Content Networks|content networks]] to be formed and used. </div><div class="large-4 columns">[[Image:GWFAuthoring.png|400px]]<br>Enterprise Wiki Collaboration</div></div> ---- {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 6f02dac07c3304ae6aef7c4d94f0ae991a11539b Content Networks 0 215 488 2015-02-26T19:02:17Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-5 columns">Enterprise content is a network of relationships between projects, events, organizations, customers, reviews, events and topics of interest to its staff, partners, and customers. There are many information technologies that can be used to reveal these relationships. This diagram captures the increasing data controls and opportunities to collaborate with more contributors. A {{Elink|http://en.wikipedia.org/wiki/Table_(information)|table}} organizes data into rows and columns. Rows represent an item and columns represent attributes or properties of the item. The intersection of a row and a column is a cell. Cells contain data values. Data controls are limited to sorting actions. A {{Elink|http://en.wikipedia.org/wiki/Spreadsheet|spreadsheet}} is a software application used to analyze data. It consists of a set of tables with enhanced controls such as functions which can modify data values using rules pivot tables which summarize and visualize data. </div><div class="large-7 columns">[[Image:TableCellsToRelationships.png|700px]] <br> Table Cells to Structured Wikis</div></div> <div class="row" ><div class="large-12 columns">{{Elink|http://en.wikipedia.org/wiki/Database|Databases}} use metadata in a schema to structure and organize information as queriable tables. {{Elink|http://en.wikipedia.org/wiki/Document_management_system|Document management systems}} organize documents into hierarchies where text can be searched. A wiki represents information as a collection of linked pages. Pages can be grouped by categories and edit history is logged. A structured wiki enables authors to annotate page text with user-defined properties. These properties define relationships which can be combined and queried to produce many different views of the same information.</div></div> <div class="row" ><div class="large-5 columns">Wikis transform a single page into a network of content. For example, a wiki could contain pages about presentations created at MITRE. A form could be used to enter the information about a presentation such as the soon-to-be famous movie, "Wikis Save MITRE." The movie could be reviewed where the reviewer could rate the movie using stars and include a comment. The movie could also be discussed or commented upon where viewers engage in a dialogue about the movie. The quality of the content about the movie could also be reviewed. Finally, readers could make lists of movies and include this movie. One wiki page about the movie item can become a network of related pages that quality or further describe the movie. In addition, the annotations in the "Wikis Save MITRE" page such as the date, time, length, description, and tags could queried and the results embedded into additional pages about the movie. To make use of iconography to improve comprehension, to visualize content as a network or hierarchy, or to rate content, see [[Gestalt Wiki Framework Extensions]].</div><div class="large-7 columns">[[Image:NetworkofPages.png|700px]]<br>Content Network</div><div> ---- {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] da50b9cad5ce09385ac2942d120ac9c749bdac6b Template:Breadcrumb 10 264 592 2015-02-26T19:07:48Z Bclemente 0 wikitext text/x-wiki <includeonly><div class="row"><div class="large-12 columns" class="hierarchyText">{{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}}</div></div> <div class="row"><div class="large-12 columns">{{New Paragraph}}</div></div></includeonly> e6bbeffbad3499881227a476c9a39a2b118ee7be Title Icons in Page 0 217 492 2015-02-26T19:23:15Z Bclemente 0 Bclemente moved page [[Title Icons Set in Page]] to [[Title Icons in Page]] without leaving a redirect wikitext text/x-wiki {{Breadcrumb}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} {{#set:Name={{PAGENAME}}}} [[Category:Page]] 3832b0804d1c7db067791b0abda46d84058398d5 Title Icons in Page and Category 0 218 494 2015-02-26T19:23:44Z Bclemente 0 Bclemente moved page [[Title Icons Set in Page and Category]] to [[Title Icons in Page and Category]] without leaving a redirect wikitext text/x-wiki {{Breadcrumb}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 2422850acbebabbd542fe5da52d07b9411c48d6d Gestalt Wiki Framework Extensions 0 216 490 2015-02-26T20:02:05Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row" ><div class="large-6 columns"> ==== Description ==== The Gestalt Wiki Framework team has written over 40 extensions for MediaWiki and Semantic MediaWiki. Eleven extensions have been contributed to the MediaWiki open source community as shown at the bottom of this page which was transcluded page from [http://www.mediawiki.org/wiki/Category:Extensions_by_MITRE MediaWiki.org]. As our extensions mature, we plan to contribute as many general purpose extensions to the MediaWiki community as funding priorities allow. This section of the wiki provides usage documentation as well as live examples of selected GWF extensions. As shown in the legend, the grey boxes display the wiki text, the blue boxes contain live examples, and the white boxes are links to live examples. Visit our documentation pages: {{#hierarchyChildren:Gestalt Wiki Framework Extensions|Table of Contents|Hierarchy Data|Name|template=X}}</div><div class="large-6 columns">{{Legend}}</div></div> ---- [[Category:Page]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} 04ea82d1f66b2c852f9482fe8f4b9b06913a8c05 Template:Legend 10 267 600 2015-02-26T20:04:40Z Bclemente 0 wikitext text/x-wiki <includeonly> <div style="border: solid 1px #c0c0c0;"> <div class="row" style="padding:5px;"><div class="small-12 columns" style="color:#009933;">'''Legend'''</div></div><div style="padding:5px;font-size:90%;"><div class="row" style="margin-bottom:-3px;"><div class="small-3 columns">Wiki text</div><div class="small-9 columns"> {| style="background: #F0F0F0;" |<pre> {{{field|Rating|input type=rating}}} </pre> |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns">Live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyBreadcrumb:Querying|Table of Contents|Hierarchy Data|Name}} |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns" >Live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:3|10}} |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns" >Link to live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;" | See [[Special:FormEdit/Review/Review:1/Bclemente | Review]] |}</div></div></div></div> </includeonly> 9c763bc2345b735539f9f07274d6803a88d8585b Semantic Rating 0 222 502 2015-02-26T20:17:01Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns">The Semantic Rating extension adds a [http://www.mediawiki.org/wiki/Extension:Semantic_Forms Semantic Form] input type to enable users to enter a rating by clicking on stars. It also adds three parser functions to display a star rating by displaying empty (gray), full (yellow), and half stars: * <code>#rating</code> displays a rating inline * <code>#ratingBeforeTitle</code> displays a rating to the left of the title at the top of the page. * <code>#ratingAfterTitle</code> displays a rating to the right of the title at the top of the page. __TOC__</div><div class="large-6 columns">{{Legend}}</div></div> ====Usage: Define a Semantic Form Rating Field==== The following will add an input field with the default maximum number of stars: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{{field|Rating|input type=rating}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example [[Special:FormEdit/Review/Review:1/Bclemente |An example Review Form]], See form here: [[Form:Review]] |} </div></div> The maximum number of stars can be set explicitly with the '''max''' parameter: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{{field|Rating|input type=rating|max=10}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" |See working example in action ????See form here: ???? |}</div></div> {{New Paragraph}} ====Usage: Display a Number as a Five Star Rating==== The following displays a number as a five star rating. <div class="row" width=100% ><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:75%;"> <pre> {{#rating:0}}<br> {{#rating:0.5}}<br> {{#rating:1}}<br> {{#rating:1.5}}<br> {{#rating:2}}<br> {{#rating:2.5}}<br> {{#rating:3}}<br> {{#rating:3.5}}<br> {{#rating:4}}<br> {{#rating:4.5}}<br> {{#rating:5}}<br> {{#rating:}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:0}}<br> {{#rating:0.5}}<br> {{#rating:1}}<br> {{#rating:1.5}}<br> {{#rating:2}}<br> {{#rating:2.5}}<br> {{#rating:3}}<br> {{#rating:3.5}}<br> {{#rating:4}}<br> {{#rating:4.5}}<br> {{#rating:5}}<br> {{#rating:}} |}</div></div> {{New Paragraph}} ====Usage: Display a Rating with Maximum Number of Stars==== To explicitly set the maximum number of stars to 10, use the following: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#rating:3|10}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:3|10}} |} </div></div> {{New Paragraph}} ====Usage: Display an Average Rating==== The following query displays the rating using the Semantic Result Format ''average''. <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#rating:{{#ask:[[Category:Reviews]][[Item::Item:1]]|?Rating|format=average}}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:{{#ask:[[Category:Reviews]][[Item::Item:1]]|?Rating|format=average}}}} |} </div></div> {{New Paragraph}} ====Usage: Display Review Results as an Average Rating==== This query displays the average rating for each item. <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ask:[[Category:Items]] |?Responsive Citation |headers=hide |mainlabel=- |format=table |class=border |limit=5 |sort=Sorting Title |order=ascending | searchlabel= }} </pre></div><div class="large-7 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;font-size:90%" |{{#ask:[[Category:Items]] |?Responsive Citation |headers=hide |mainlabel=- |format=table |class=border |limit=5 |sort=Sorting Title |order=ascending | searchlabel= }} |}</div></div> {{New Paragraph}} ====Usage: Rating Before Title==== To explicitly set the number of stars to be displayed ''before'' the page title, use <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ratingBeforeTitle:5}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example on this page: [[Rating Before Title]] |} </div></div> {{New Paragraph}} ====Usage: Rating After Title==== To explicitly set the number of stars to be displayed ''after'' the page title, use <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ratingAfterTitle:3}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example on this page: [[Rating After Title]] |} </div></div> {{Download|http://www.mediawiki.org/wiki/Extension:Semantic Rating}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 8d130498264bbc007c7cb981c773f442722b1d22 VIKI Network Graph 0 223 504 2015-02-26T20:17:44Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row" style="background:white;" width=100%><div class="large-5 columns" > '''VIKI''' (Visualization and Knowledge Integration) is an extension that displays the structure of wiki content as the inbound, outbound, and second order links for a list of wiki pages. It was implemented using D3 as a directed force layout graph visualization. In a VIKI graph, graph nodes represent individual wiki pages or web pages, while links between nodes indicate page links (i.e. one page has a hyperlink to another page, e.g. of the form <nowiki>[[Page Link]]</nowiki>). These links are directional, where the direction of the link indicates which page links to which. If two pages link to each other, the link is bidirectional. Two pages are linked on a VIKI graph if there is a link between their nodes on the graph, i.e. either of the two pages links to the other, or they link to each other. Some wiki pages also have hyperlinks to external web pages; these pages are also displayed on the VIKI graph (with a generic wi-fi icon), but interaction with these pages is limited. {{New Paragraph}} The graph is pannable and zoomable using either the mouse scroll action or the zoom bar located at the bottom of the graph. Individual nodes may be dragged around and rearranged as well; the D3 graph automatically revises node positions to a local equilibrium state whenever nodes are dragged. </div><div class="large-7 columns" style="border: solid 1px #E8E8E8;background:#ADDFFF;"> {{New Paragraph}} {{#viki:pageTitles=Gestalt Wiki Framework Extensions|width=490|height=490}} </div></div> The graph is first initialized with a (user-defined) list of wiki pages, along with all pages linked to these pages. Pages linked to this secondary level of pages are not initially displayed – only the first order links are initially present. The user may then choose to elaborate a node; elaboration involves retrieving and displaying all linked pages for the given node’s page. Elaboration of a node expands the VIKI graph, and users may expand the graph to explore the structure of the wiki. Elaborated nodes are also called hub nodes, and the length of links to hub nodes is longer for improved graph visibility. Users may also choose to hide individual nodes and/or hide entire hubs to focus down the graph to areas of interest. ====Usage==== Users may right click on a given node to bring up a context menu of options. Below is a list of all possible options, but not all nodes may have all options as appropriate. * ''Freeze'': this node becomes frozen in position while other nodes may move around it * ''Visit Page'': opens the page represented by the node in a new tab or window * ''Elaborate'': elaborates a node, as discussed previously * ''Show Categories'': Pops up a JavaScript alert listing the categories this page belongs to. (Under construction.) * ''Hide Node'': Removes this node and links to it from the VIKI graph. * ''Hide Hub'': Removes this hub node and all nodes immediately linked to it from the VIKI graph, unless the linked node is itself a hub. * ''Show All'': Adds all previously-hidden nodes and links back into the VIKI graph. To embed a VIKI graph into a page, the following parser function syntax is used: <div class="row" width=100%><div class="large-12 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre>{{ #viki:pageTitles=First Page Title, Second Page Title,…|width=width|height=height|delimiter=delimiter }}</pre> </div></div> '''Parameters''' * ''pageTitles'': a list of wiki pages (given by title) to comprise the initial graph (default: the current page) * ''width'': the desired width (in pixels) of the graph (default: 1200) * ''height'': the desired height of the graph (default: 600) * ''delimiter'': the desired delimiter that separates between pageTitles (default: ,) ====VIKI Plugin System==== VIKI is designed to be extensible, with a built-in hook system. Developers can write MediaWiki extensions which serve as plugins to the core VIKI architecture to enhance or modify the VIKI graph behavior. Details about the plugin structure can be found at [[VIKI Plugin Structure|this page]]. Two VIKI plugins enhance functionality and/or provide compatibility support for other MediaWiki and Semantic MediaWiki extensions: * [[VIKI Semantic Title]] extension provides support for pages using the [http://www.mediawiki.org/wiki/Extension:SemanticTitle Semantic Title] extension * [[VIKI Title Icon]] extension provides enhanced functionality for pages using the [[Title Icon]] extension {{Download|http://www.mediawiki.org/wiki/Extension:VIKI}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 75fb38089784560678141bc7b8f13551e4371702 VIKI Semantic Title 0 224 506 2015-02-26T20:18:52Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row"><div class="large-12 columns"> ====Description==== VIKI Semantic Title is an extension to the VIKI extension to handle pages which use semantic page naming. In semantic page naming, the name of a page is not a human-readable title, but rather something of a systematic format (e.g. "Item:1"), and the title of the page is set via a semantic property. Because VikiJS shows page titles for nodes, this extension ensures that the proper page display title is used rather than the systematic title. See also the [http://www.mediawiki.org/wiki/Extension:SemanticTitle SemanticTitle] extension for more details on semantic page naming. The citation pages used to demonstrate Semantic Rating were constructed using Semantic Titles. Instead of displaying node names using actual page names such as Item:1, Item:2, etc., the semantic property [[Property:Full Title]] as the semantic page title. {| style="background:#ADDFFF;" |{{#viki:pageTitles=Semantic Rating|width=900|height=600}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:VikiSemanticTitle}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=VIKI.png}} [[Category:Page]] 350a8ef4dd8b108abaf53656e562a3a68a8b7321 VIKI Title Icon 0 225 508 2015-02-26T20:19:37Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row"><div class="large-12 columns"> ====Description==== VIKI Title Icon is an extension to the VIKI extension which adds support for [[Title Icon]]. If a page has a title icon, the title icon will render as the node logo for that page in place of its wiki logo. The VIKI graph below uses the Title Icon property for its the nodes. {| style="background:#ADDFFF;" |{{#viki:pageTitles=Title Icon|width=900|height=600}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:VikiTitleIcon}} {{#set:Title Icon=VIKI.png}} [[Category:Page]] 5079e1f795833e0286d585a273c84489a998ca24 Hierarchy Builder 0 226 510 2015-02-26T20:22:00Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row" ><div class="large-7 columns">The Hierarchy Builder extension allows authors to create hierarchies as bullets in a page, use checkboxes to select hierarchical elements from a form, create and edit hierarchies using drag and drop, query and display the hierarchy results. The Table of Contents for this wiki is used as the hierarchy for many of the examples of the use the extension below. This page provides working examples of how to create and display hierarchies, use checkboxes to select hierarchical elements from a form, create and edit hierarchies using drag and drop. The next page provides working examples of how to [[Hierarchy Querying |query hierarchies]]. For download and installation instructions, see [http://www.mediawiki.org/wiki/Extension:HierarchyBuilder HierarchyBuilder].</div> <div class="large-5 columns" style="font-size:80%;"> {{#hierarchySubtree:Gestalt Wiki Framework Extensions|Table of Contents|Hierarchy Data|displaynameproperty=Name|showroot}} </div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} __NOTOC__ {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 035eb613b3bbaa82b13c1b63f3fbcf2c2d23c8de Selecting 0 229 516 2015-02-26T20:30:09Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ==== Description ==== <div class="row"><div class="large-6 columns"> The hierarchySelect Semantic Form input type allows users to select a subset of pages from a hierarchy within a form to populate a multi-valued property of type Page. </div> <div class="large-6 columns">[[Image:ExtensionUsage.png|400px]]<br>Screenshot of Form:Survey</div> </div> ==== Usage ==== The hierarchySelect input type can be seen in action by clicking on the "Click this Link" link. The name of the property that stores the hierarchy [[Property:Hierarchy Data]] and the page on which that property is set, [[Gestalt Extensions]], must be provided in the form in order to be able to locate the hierarchy. <div class="row" ><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre><includeonly> {{{info|page name=Survey Response_<unique number;start=001>|create title=Survey|edit title=Survey}}} {{{for template|Survey}}} {| class="formtable" ! Which extensions have you used? | {{{field|Extensions|input type=hierarchySelect|pagename=Gestalt Extensions|propertyname=Hierarchy Data|list}}} |} {{{end template}}} {{{standard input|save}}} {{{standard input|cancel}}} </includeonly></pre></div> <div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;" |{{#formlink:form=Survey|link text=Click this link|link type=link}} |- |Click on these pages and then open them using "Edit" dropdown action{{#ask: [[Category:Responses]] |?Extensions |format=table }} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 6567a171190e2f06369774a108e0cde162575803 Creating 0 227 512 2015-02-26T20:33:36Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns"> This page describes how to create hierarchies using the <nowiki><hierarchy></nowiki> tag. There are three optional attributes the <nowiki><hierarchy></nowiki> tag takes: ''collapsed, displaynameproperty'', and ''autonumbered''. The grey boxes on the left show the wikitext code. The blue boxes on the right show the extension in action.__TOC__</div><div class="large-6 columns">{{Legend}}</div></div> ====Usage: Hierarchy Expanded==== This is an example of the use of the <nowiki><hierarchy></nowiki> tag without any attributes. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> <hierarchy> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy Collapsed==== To show a hierarchy collapsed, add the attribute ''collapsed.'' <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy collapsed> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy collapsed> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy With Different Display Names==== <p>To display a different page name, set the attribute ''displaynameproperty'' to a different property name. The citations in this wiki use the following page naming: Item:1..n. Each page in Category:Items has a property Short_Title.</p> <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy displaynameproperty=Short_Title> *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy displaynameproperty=Short_Title> *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy With Different Display Names and Element Numbers==== <p>Building on the example above, add the attribute ''numbered.''</p> <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy numbered displaynameproperty=Short_Title > *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy numbered displaynameproperty=Short_Title > *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] a7fbc000af556b1199050a7ec277b170fba894f7 Querying 0 230 518 2015-02-26T21:51:29Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} __NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns"> This page describes how to use Hierarchy Builder's parser functions to query the elements in a hierarchy. __TOC__</div> <div class="large-6 columns">{{Legend}}</div></div> ====Usage: Hierarchy Breadcrumb==== The ''hierarchyBreadcrumb'' parser function can be used to display a hierarchy breadcrumb bar at the top of a page including the previous row, hierarchical parent row, and next row within the hierarchy. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | current page | Text | '' | The current page within the hierarchy for which the breadcrumb should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be used. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | displaynameproperty | Text | '' | The property containing a page's display name if using semantic page names. |} The parser function invocation below displays the breadcrumb for the page ''{{FULLPAGENAME}}'' within the hierarchy stored in property ''Hierarchy Data'' on the page ''Table of Contents'' using the semantic page names stored within the property ''Name'' on each page. The bar might contain the row that immediately precedes ''{{FULLPAGENAME}}'', immediately succeeds ''{{FULLPAGENAME}}'', and the hierarchical parent of ''{{FULLPAGENAME}}'' within the hierarchy on the page ''Table of Contents''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}} |}</div></div> ====Usage: Hierarchy Children==== The ''hierarchyChildren'' parser function can be used to retrieve the immediate hierarchical children of a given page from a hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | '' | The target page within the hierarchy for which the immediate children should be returned. If left empty then all root level rows will be returned instead. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | template | Text | '' | The name of a template with which to display the printouts. |- | introtemplate | Text | '' | The name of a template to display before the results if there are any. |- | outrotemplate | Text | '' | The name of a template to display after the results if there are any. |- | link | 'none' / <i>empty</i> | '' | Used to specify whether or not to display results as links if there are any results. |- | sep | Text | ',' | Used to specify the separator for returned values. |} The parser function takes the following three mandatory arguments in order: page name, hierarchy page, and hierarchy property. There are also the following optional arguments: ''sep'', ''template'', ''introtemplate'', ''outrotemplate'', and ''link''. The ''sep'' argument is used to specify the separator for returned values. The argument ''template'' is the name of a template with which to display the printouts. The ''introtemplate'' argument is the name of a template to display before the results if there are any. The ''outrotemplate'' argument is the name of a template to display after the results if there are any. The argument ''link'' is used to specify whether or not to display results as links if there are any results. The value of the ''link'' argument can either be empty or ''none''. By default, ''link'' is enabled. The parser function invocation below displays the template ''Y'' followed by the immediate children of the page ''Table of Contents'' in the hierarchy stored in the property ''hierarchy property'' on the page ''hierarchy page'' after applying the template ''X'' to each result, followed by the template ''Z''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyChildren:Hierarchy Builder|Table of Contents|Hierarchy Data|template=X|introtemplate=Y|outrotemplate=Z|link=none}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyChildren:Hierarchy Builder|Table of Contents|Hierarchy Data|template=X|introtemplate=Y|outrotemplate=Z|link=none}} |}</div></div> ====Usage: Hierarchy Parent==== The ''hierarchyParent'' parser function is used to retrieve the hierarchical parent of a given page from a hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | Mandatory | The target page within the hierarchy for which the immediate hierarchical parent should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | template | Text | '' | The name of a template with which to display the printouts. |- | introtemplate | Text | '' | The name of a template to display before the results if there are any. |- | outrotemplate | Text | '' | The name of a template to display after the results if there are any. |- | link | 'none' / <i>empty</i> | '' | Used to specify whether or not to display results as links if there are any results. |- | sep | Text | ',' | Used to specify the separator for returned values. |} The parser function take the following three mandatory arguments in order: page name, hierarchy page, and hierarchy property. Additionally, there are also the following optional arguments: ''template'', ''introtemplate'', ''outrotemplate'', and ''link''. Each of these arguments behaves the same as they do for the ''hierarchyChildren ''parser function above. The argument ''template'' is the name of a template with which to display the printouts. The ''introtemplate'' argument is the name of a template to display before the results if there are any. The ''outrotemplate'' argument is the name of a template to display after the results if there are any. The argument ''link'' is used to specify whether or not to display results as links if there are any results. The value of the ''link'' argument can either be empty or ''none''. By default, ''link'' is enabled. The parser function invocation below displays the hierarchical parent row of ''{{FULLPAGENAME}}'' within the hierarchy stored in property ''hierarchy property'' on the page ''hierarchy page name'' rendered as a hyperlink. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyParent:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|link=none}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyParent:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|link=none}} |}</div></div> ====Usage: Hierarchy Section Number==== The ''hierarchySectionNumber'' parser function is used to automatically compute a given page's section number within a particular hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | Mandatory | The target page within the hierarchy for which the section number should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |} The parser function takes three mandatory arguments in order: page name, hierarchy page, and hierarchy property. The parser function invocation below give the section number of the page ''{{FULLPAGENAME}}'' within the hierarchy in property ''Hierarchy Data'' on the page ''[[Table of Contents]]''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchySectionNumber:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySectionNumber:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data}} |}</div></div> ====Usage: Hierarchy Subtree==== The ''hierarchySubtree'' parser function is used to render the subtree rooted at a given node within a specified hierarchy. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | root node | Text | Mandatory | The node that forms the root of the desired subtree. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | format | 'ul' / <i>empty</i> | '' | Used to specify the display formatting of the returned subtree. Either bulleted or hierarchical. |- | displaynameproperty | Text | '' | The name of the property containing a page's display name. Used to support semantic page names. |- | showroot | 'showroot' / <i>empty</i> | '' | Used to specify that the subtree's root should also be displayed. |- | collapsed | 'collapsed' / <i>empty</i> | '' | Used to specify that the subtree should be initialized in collapsed mode. |} The parser function takes three mandatory arguments in order: root node, hierarchy page, and hierarchy property. If format is given as 'ul' then the subtree will be rendered as a bulleted list. Otherwise, the subtree is rendered by default as a hierarchy. If 'showroot' is given then the root of the subree will be rendered as a part of the result. By default the root of the subtree is hidden in the display. If 'collapsed' is given then the subtree will be initialized in collapsed mode. By default the subtree is not rendered in collapsed mode. The parser function invocation below renders the subtree rooted at "Hierarchy Builder" within the hierarchy in property ''Hierarchy Data'' on the page ''Table of Contents'' as a bulleted list. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchySubtree:Hierarchy Builder|Table of Contents|Hierarchy Data}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySubtree:Hierarchy Builder|Table of Contents|Hierarchy Data}} |}</div></div> ====Usage: Hierarchy Selected==== The ''hierarchySelected'' parser function is used to find and render the minimum spanning tree that contains specified rows within a hierarchy in addition to the root node of the specified hierarchy. The rendered minimum spanning tree will show each selected node with a checked box. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | selected pages | Text | Mandatory | A comma delimited list of rows that are selected within a hierarchy. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | display mode | 'collapsed' / <i>empty</i> | '' | Used to specify whether the rendered minimum spanning tree should be initialized in collapsed mode or not. |} The parser function takes three mandatory arguments in order: selected pages, hierarchy page, and hierarchy property. If the display mode is given as 'collapsed' then the minimum spanning tree will be initialized in collapsed display mode. The parser function invocation below renders the minimum spanning tree in collapsed mode of the hierarchy in property ''hierarchy property'' on the page ''hierarchy page name'' which contained the hierarchy root and each of the listed page names so that the listed page names would be marked as "checked". <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:60%;"> <pre> {{#hierarchySelected:Creating,Editing,Selecting,Querying|Table of Contents|Hierarchy Data|collapsed}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySelected:Creating,Editing,Selecting,Querying|Table of Contents|Hierarchy Data|collapsed}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 2632ea1e3c5b8b961b5864997ef710118c562252 About 0 231 520 2015-02-26T22:00:50Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-6 columns">GWF wikis are hosted on virtual machines built on a LAMP stack. LAMP includes: *{{Elink|http://en.wikipedia.org/wiki/Linux|Linux}} operating system, *{{Elink|http://en.wikipedia.org/wiki/Apache_HTTP_Server|Apache HTTP Server}}, *{{Elink|http://en.wikipedia.org/wiki/MySQL|MySQL}} relational database management system, and *{{Elink|http://en.wikipedia.org/wiki/PHP|PHP}} programming language. {{New Paragraph}} Wiki software from {{Elink|http://www.mediawiki.org/wiki/MediaWiki|MediaWiki}} and {{Elink|https://semantic-mediawiki.org|Semantic MediaWiki}} is used. MediaWiki is used to run {{Elink|https://en.wikipedia.org/|Wikipedia}} and is used by {{Elink|https://wikiapiary.com/wiki/Main_Page|over 25,000}} sites. Semantic MediaWiki is used by {{Elink|https://wikiapiary.com/wiki/Main_Page|over 1,300 sites}} to annotate page content with properties that can be queried and visualized. Many GWF extensions, some of which are MediaWiki extensions and others which are Semantic MediaWiki extensions have been contributed to the {{Elink|http://www.mediawiki.org/wiki/Category:Extensions_by_MITRE|open source community}}. All the software components used to build this GWF wiki are automatically listed on the [[Special:Version|version page]]. </div> <div class="large-6 columns">[[Image:MGF.png|600px]]<br>GWF Stack</div></div> To learn more about Gestalt Wiki Framework, see our [[Publications|publications]], [[Team|team]], [[MITRE|enterprise]], and [[Contact |contact information]] pages. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] cdf4b93b326c5b1d417512739184e705d57cd892 Background 0 213 484 2015-02-27T23:19:33Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-12 columns">The broad enterprise encyclopedia, MITREpedia, was established in 2004 as a grassroots effort to capture technical enterprise knowledge as linked articles rather than bulleted presentations. The linear nature of slide presentations, however, forces authors to reduce complex subjects to a set of bullet items that are too weak to support decision-making or show the complexity of an issue. Information designer and visualization expert Edward Tufte has argued that bulleted presentations encourages simplistic thinking where ideas are squashed into lists and stories are transformed into a collection of disparate points<ref>See Wikipedia' article about [http://en.wikipedia.org/wiki/Edward_Tufte#Criticism_of_PowerPoint Edward Tufte views on bullet-based presentations]</ref>. {{New Paragraph}} MITREpedia project governance was led by a MITREpedia Users Group consisting of staff content providers and MITREpedia system administrators. As a grassroots volunteer encyclopedia, MITREpedia's structure evolved over time with the development of categories as a by-product of authoring articles. Navigational elements to improve findability included a featured article, recent contributions, categories, and enterprise "fast jumps"-- named enterprise links. Topic-specific "wiki portals," a major findability element for Wikipedia, were not adopted. {{New Paragraph}} The Gestalt Wiki Framework (GWF) effort began as a single Semantic MediaWiki-based wiki about human language technology (HLT) in 2006. The purpose was to produce a dynamic, growing knowledge repository for MITRE's work in HLT to maintain continuous enterprise situational awareness, i.e. "the big picture or "Gestalt" about HLT at MITRE without creating periodic surveys, scheduling meetings, conducting enterprise searches, and analyzing financial project data. Languapedia's sidebar was customized for the HLT community to link to projects, people, events, and HLT topics. </div></div> <div class="row" ><div class="large-4 columns">Librarian staff discovered Languapedia after searching for an approach to develop a highly structured, highly findable biosecurity collection. Biopedia was the second wiki to be constructed. Robopedia, the third wiki, grew at a significantly more rapid pace than Languapedia nor Biopedia. Languapedia was established as an experiment without socialization within the community. Biopedia was developed as part of a diffuse group's needs to establish biosecurity as an important up and coming interest. Robopedia represented the needs of a dedicated group of technologists who depend heavily on technical documentation. It currently contains ~8,800 pages, has ~150 users, and won a MITRE Knowledge Management Award in 2012. Robopedia became the poster wiki for many GWF wikis developed at MITRE as well as GWF wikis developed for MITRE customers. </div><div class="large-8 columns">[[Image:Reuse.png|800px]]<br>Gestalt Wiki Influence Path</div></div> <div class="row" ><div class="large-12 columns">As the team grew from one to seven, we developed best practices for GWF extension development as well as wiki and wiki farm development to help us work across multiple funding sources and customers simultaneously. In 2014, MITREpedia was transitioned to the McLean, VA Gestalt Wiki Framework team. It was upgraded from MediaWiki 1.13 to 1.23 from XML page exports because the MySQL database was so old that the update script failed to run. With MITREpedia's 25,000 pages, we have 60,000 pages on active wikis and 57,000 pages in read-only archive. Our vision is to work towards federating all the Gestalt Wiki Framework wikis with MITREpedia as the entry point for enterprise wiki knowledge and the topic-specific wikis. Learn more about today's [[Gestalt Wiki Framework]]. </div></div> ---- {{RefList}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 0c789e2fdfef1ab499622b1036a62a690a53f052 Gestalt Wiki Framework 0 212 482 2015-02-27T23:22:30Z Bclemente 0 wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-8 columns">The '''[[Contact|Gestalt Wiki Framework]]''' (GWF) is a set of patterns and open source software that enables groups to build enterprise knowledge using structured wikis. This is our showcase for both ''enterprise knowledge stewards'' who are interested in wiki-based knowledge management and ''wiki builders'' who want to learn how to use GWF extensions. {{New Paragraph}} Enterprise knowledge stewards may want to read more about the [[Background |background]] of the evolution and use of GWF in the enterprise as well as [[Enterprise Collaboration |enterprise collaboration with wikis]] and how enterprise content becomes a [[Content Networks|content network]]. Wiki-based enterprise knowledge management using GWF involves authors contributing content using forms. These contributions may be combined with enterprise data, queried, and visualized. Visualizations include automatically computed tables, tag clouds, bar charts, pie charts, time lines, calendars, and network graphs to enable readers to see the "big picture" of enterprise community knowledge. GWF allows authors to contribute content once and use that content in many ways. The name "Gestalt" was chosen to reflect the evolving "big picture" of enterprise knowledge as communities collaboratively create, combine, and use their collective contributions towards a greater purpose. {{New Paragraph}} Wiki builders may be interested in jumping ahead to the [[Gestalt Wiki Framework Extensions|extensions documentation section]]. As a showcase for GWF extensions, we used many extension features throughout the site. For example, the green asterisk logo next to the title of this page is an example of the [[Title Icon]] extension.The information contained in the Table of Contents on the right is used in the green breadcrumb bar at the top of this page to help users navigate pages sequentially. Both the Table of Contents and the breadcrumbs are features provided by the [[Hierarchy Builder]] extension. {{New Paragraph}} Our team has built over 70 unique wikis since 2006. Half of these wikis are currently actively used at MITRE and on customer networks. Enterprise wiki collaboration is different than Wikipedian collaboration. Many enterprises lack 100,000+ volunteer editors with an evolved wiki culture. We have found that in addition to adapting wiki technology to the enterprise, wiki success occurs when a community champion successfully articulates the purpose of a wiki and transforms existing business processes away from the dependency on document-based email collaboration. Read more about [[Enterprise Collaboration|enterprise collaboration]] and how wikis can help. <!-- As shown in the interactive [[Table of Contents]] on the right, this site is organized into three sections. The first section describes the [[Background |background]] of the GWF, as well as two concepts: how [[Enterprise Collaboration |enterprise collaboration]] can be conducted using a wiki and how the structure of the content becomes a [[Content Networks |network]]. The second section documents selected [[Gestalt Wiki Framework Extensions |extensions]] and provides working examples. The third section includes additional information about our [[Publications|publications]], [[Team|team]], [[MITRE|enterprise]], and [[Contact |contact information]].--> </div><div class="large-4 columns" style="font-size:70%;background: white !important;">[[Image:GWFAuthoringMosaic.png|400px]]<br>Gestalt: The whole is greater than the sum of its parts.<br>{{#hierarchySubtree:Table of Contents|Table of Contents|Hierarchy Data|displaynameproperty=Name|showroot}} </div></div> ---- There are [[Special:Statistics|{{NUMBEROFPAGES}}]] pages in this wiki. [[To do]] {{DISPLAYTITLE:Gestalt Wiki Framework}} {{#set:Name={{PAGENAME}}}}__NOTOC__ [[Category:Page]] 09e70b09e205cbb4e8b74ca9972dbc3f8e81c297 Template:Collapse top 10 110 261 2015-04-06T00:02:07Z Shirayuki 0 wikitext text/x-wiki <noinclude> {{languages}} </noinclude><div style="display:{{{display|block}}};margin-{{dir|{{pagelang}}|right|left}}:{{{indent|0px}}};{{{extrastyle|}}}"><!-- NOTE: width renders incorrectly if added to main STYLE section--> {| <!-- Template:Collapse top --> class="navbox mw-collapsible {{{{{|safesubst:}}}#if:{{{expand|}}}||mw-collapsed}}" style="background: {{{bg1|transparent}}}; text-align: {{dir|{{pagelang}}|right|left}}; border: {{{border|1px}}} solid {{{b-color|silver}}}; margin-top: 0.2em; {{{{{|safesubst:}}}#if:{{{width|}}}|width:{{{width}}};}}" |- ! style="background-color: {{{bg|#F8FCFF}}}; text-align:{{{{{|safesubst:}}}#if:{{{left|}}}|{{dir|{{pagelang}}|right|left}}|center}}; font-size:112%; color: {{{fc|black}}};" | {{{1|{{{title|{{{reason|{{{header|{{{heading|Extended content}}} }}} }}} }}} }}} {{{{{|safesubst:}}}#if:{{{warning|{{{2|}}}}}} |{{{{{|safesubst:}}}!}}- {{{{{|safesubst:}}}!}} style="text-align:center; font-style:italic;" {{{{{|safesubst:}}}!}} {{{2|The following is a closed debate. {{strongbad|Please do not modify it.}} }}} }} |- | style="border: solid {{{border2|1px silver}}}; padding: {{{padding|8px}}}; background-color: {{{bg2|white}}}; font-size:112%;" {{{{{|safesubst:}}}!}}<noinclude> <center>''The following content has been placed in a collapsed box for improved usability.''</center> {{ {{TNTN|Collapse bottom}} }} {{ {{TNTN|Documentation}} }} [[Category:Formatting templates{{translation}}]] </noinclude> 58b88ddc94c40339f599638719179f4058670e35 Template:Navbox 10 121 285 2015-04-06T11:06:09Z Edokter 0 Again, make any necessary fixes in the MODULE. If you don't know how, raise the issue on the talk page. wikitext text/x-wiki <includeonly>{{#invoke:Navbox|navbox}}</includeonly><noinclude> {{Documentation}} </noinclude> fe9b964401f895918ee4fe078678f1722a3c41ec Template:Nmbox 10 137 323 2015-04-19T07:33:33Z Shirayuki 0 dir wikitext text/x-wiki <table class="nmbox" style="border:1px solid #AAA; border-collapse:collapse; clear:both; font-size:85%; margin: 0.5em 0"> <tr style="background:#EEF3E2"> {{#if:{{{image|}}}{{{header|}}} | <th class="mbox-image" style="white-space:nowrap; padding:4px 1em; border-{{dir|{{pagelang}}|left|right}}:1px solid #aaa">{{{image|}}} {{{header|}}}</th> | <td class="mbox-empty-cell"></td> <!-- No image. Cell with some width or padding necessary for text cell to have 100% width. --> }} <td class="mbox-text" style="background:#F6F9ED">{{{text|}}}</td> </tr></table><noinclude> {{documentation}} </noinclude> 3e5942f8af86a878f6abd3a6eeec367502baea89 Nested Tabs 2 0 239 536 2015-05-05T11:57:50Z Bclemente 0 Created page with "<div style="font-size:80%;"> <div class="section-container auto" data-section> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Background</..." wikitext text/x-wiki <div style="font-size:80%;"> <div class="section-container auto" data-section> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Background</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework}}}} {{Tab||Background|{{:Background}}}} {{Tab||Enterprise Collaboration|{{:Enterprise Collaboration}}}} {{Tab||Content Networks|{{:Content Networks}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Design</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Development</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Configure a Wiki|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Classes|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Queries and Visualizations|[[Image:UnderConstruction.png|50px]]}} {{Tab||Patterns|[[Image:UnderConstruction.png|50px]]}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Gestalt Wiki Framework Extensions</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework Extensions}}}} {{Tab||Title Icon|{{:Title Icon}}}} {{Tab||Semantic Rating|{{:Semantic Rating}}}} {{Tab||VIKI Network Graph|{{:VIKI Network Graph}}}} {{Tab||VIKI Semantic Title|{{:VIKI Semantic Title}}}} {{Tab||VIKI Title Icon|{{:VIKI Title Icon}}}} {{Tab||Hierarchy Builder|{{:Hierarchy Builder}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>About</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Publications|{{:Publications}}}} {{Tab||Team|{{:Team}}}} {{Tab||MITRE|{{:MITRE}}}} {{Tab||Contact|{{:Contact}}}} </div></div></div> </div> __NOTOC__ {{#set:Hide Title Icon=all}} c8a0aaf4f28e87f141edba6963927368fddb3de0 Template:Presentation 10 260 582 2015-05-19T11:43:15Z Bclemente 0 wikitext text/x-wiki <includeonly>{| class="wikitable" ! Description | {{{Description|}}} |- ! Authors | {{#arraymap:{{{Authors|}}}|,|@@@@|[[User:@@@@]]}} |- ! Date | {{{Has date|}}} |} {{#if:{{{File|}}}| {{#widget:Iframe |url={{filepath:{{{File}}}}} |width=900 |height=800 |border=0 }}}} <div style="display:none;"> {{#set:Name={{{Name|}}}}} {{#set:Description={{{Description|}}}}} {{#arraymap:{{{Authors|}}}|,|@@@@|{{#set:Authors=@@@@}}}} {{#set:Has date={{{Has date|}}}}} {{#set:Responsive Presentation=<div class="row"><div class="large-2 columns">[[Image:{{{Thumbnail}}}|200px|link={{PAGENAME}}]]</div><div class="large-10 columns">[[{{PAGENAME}}]]</div></div>}} [[Category:Presentations]] </div> </includeonly><noinclude>[[Category:Framework Pages]]</noinclude> 2a607dea97787ff2a039fecffd8ded441ff5e27c Form:Presentation 106 261 584 2015-05-19T11:45:13Z Bclemente 0 wikitext text/x-wiki <includeonly> {{{for template|Presentation}}} {| class="formtable" ! Description | {{{field|Description}}} |- ! Authors: | {{{field|Authors}}} |- ! Date | {{{field|Has date}}} |- ! Thumbnail | {{{field|Thumbnail|uploadable}}} |- ! File | {{{field|File|uploadable}}} |} {{{end template}}} {{{standard input|save}}} {{{standard input|cancel}}} </includeonly> <noinclude> [[Category:Framework Pages]] </noinclude> aec2aff2b37674cc42c9dc0386c81e1dbab4506c Property:Has date 102 163 586 373 2015-05-19T11:55:37Z Bclemente 0 Created page with "[[Has type::Date]] [[Category:Framework Pages]]" wikitext text/x-wiki [[Has type::Date]] [[Category:Framework Pages]] 0029eb2c66667853bff2027f47be98e28562e980 Blogs and Presentations 0 232 522 2015-05-19T12:00:23Z Bclemente 0 wikitext text/x-wiki __NOEDITSECTION__ ====Blogs==== [[Image:BlogOrigins.png|200px|link=https://publish.mitre.org/kde/2015/03/26/gestalt-wikis-at-mitre-march-2015]] [https://publish.mitre.org/kde/2015/03/26/gestalt-wikis-at-mitre-march-2015/ Gestalt Wikis at MITRE Knowledge Driven Enterprise Blog] ---- ====Presentations==== {{#ask: [[Category:Presentations]] |limit=100 |?Responsive Presentation= |?Has date=Date |sort=Has date |order=descending |mainlabel=- |format=table }} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Presentations.png}} [[Category:Page]] 72a0948a6ecfd70509d7ac36ad1520340cc17141 Team 0 233 524 2015-05-19T12:02:32Z Bclemente 0 wikitext text/x-wiki {{#ask: [[Category:Users]][[Linkedin-url::+]] |?Linkedin-url= |?Name= |format=template |template=Gallery }} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 9b40ff5b461351505cc3046dee205ad0f0f54985 MITRE 0 235 528 2015-05-19T12:02:42Z Bclemente 0 wikitext text/x-wiki <div class="row" ><div class="large-8 columns">Our team works at MITRE, a not-for-profit organization that operates research and development centers sponsored by the federal government. MITRE operates FFRDCs—federally funded research and development centers—which are unique organizations that assist the United States government with: * Scientific research and analysis * Development and acquisition * Systems engineering and integration MITRE also has an independent research program that explores new and expanded uses of technologies to solve customers' problems. For more information about MITRE, visit [http://www.mitre.org mitre.org].</div><div class="large-4 columns">[[Image:MITRE1.png|500px|MITRE McLean, VA]]<br>MITRE, McLean, VA</div></div> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 102774df2e2047838096c6b4ab061e543b226a6e Contact 0 236 530 2015-05-19T12:02:52Z Bclemente 0 wikitext text/x-wiki If you are interested in *Learning more about the Gestalt Wiki Framework, *How enterprise wikis can help government agencies build and share knowledge, or *Providing us feedback on this site, Please send email to: [mailto:bclemente@mitre.org Gestalt Wiki Framework team]. {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 73e6ba07c11f1e0839bd9e2a41939258ff0912e9 Keywords 0 262 588 2015-05-19T14:21:28Z Bclemente 0 Created page with "<div style="display:none;"> {{#vardefine:keyword|{{lc:{{#urldecode:{{#urlget:keyword}}}}}}}} </div> {{#ask:[[Category:Research Proposals]][[Keywords::{{#var:keyword}}]] |?Ave..." wikitext text/x-wiki <div style="display:none;"> {{#vardefine:keyword|{{lc:{{#urldecode:{{#urlget:keyword}}}}}}}} </div> {{#ask:[[Category:Research Proposals]][[Keywords::{{#var:keyword}}]] |?Average Rating Stars |?Citation |mainlabel=- |headers=hide |class=citationtable |limit=50 |searchlabel= |sort=Average Rating Number |order=desc }} <div style="display:none;"> {{#set:Dynamic Display=$keyword}} {{#set:Logo Link=Keywords.png}} {{DISPLAYTITLE:{{#var:keyword}}}} [[Category:Framework Pages]] </div> ad18314a82d7b8c5bc77819db0cd653f023cd104 Property:Keyword 102 263 590 2015-05-19T14:33:56Z Bclemente 0 Created page with "This is a property of type [[Has type::Text]]. [[Category:Framework Pages]]" wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Template:GetFallback 10 132 313 2015-05-19T21:46:02Z Matiia 0 Reverted edits by [[Special:Contributions/99.119.254.205|99.119.254.205]] ([[User talk:99.119.254.205|talk]]) to last revision by [[User:Shirayuki|Shirayuki]] wikitext text/x-wiki {{#switch: {{Uselang|lang={{{1|}}}}} | af | fy | li | nl-informal | vls | zea = nl | arz = ar | be-tarask = be-x-old | be-x-old = be-tarask <!-- same language; be-x-old is used on be-x-old.wikipedia but be-tarask is the preferred code --> | crh-cyrl | crh-latn = crh | ckb | mzn | glk = fa | als | bar | de-formal | de-at | de-ch | frr | ksh = de | hif-deva | hif-latn = hif | ike-cans | ike-latn = ike | kk-arab | kk-cyrl | kk-latn | kk-cn | kk-kz | kk-tr = kk | ku-latn | ku-arab = ku | mg | br | co | frp | ht | ty | wa = fr | nds = nds-nl | nds-nl | pdt = nds | pt-br = pt | ruq-cyrl | ruq-grek | ruq-latn = ruq | sr-ec | sr-el = sr | tg-cyrl | tg-latn = tg | tt-cyrl | tt-latn = tt | vec = it | zh | zh-cn | zh-my | zh-sg = zh-hans | zh-hk | zh-mo | zh-tw = zh-hant | szl | csb = pl | en-gb = en | #default = {{#if: {{{default|}}} | {{{default|}}} | en }} }}<noinclude> {{documentation}} </noinclude> b81791cc126e09f5e9e4c149056a58ba8b929a9d Template:Collapse top/doc 10 141 331 2015-05-26T21:21:29Z SPage (WMF) 0 mention [[w:Template:Collapse top]] for documentation wikitext text/x-wiki <noinclude>{{Documentation subpage}} {{timw|{{BASEPAGENAME}}}} </noinclude> <!-- PUT HERE THE DOCUMENTATION --> Use with {{tl|Collapse bottom}}, putting the content to be collapsed between the two templates. This template has many parameters ''that should be documented here''. For now, see the documentation for [[w:Template:Collapse top|the equivalent template on enwiki]]. f6192f75f65394f03685259cce62518779d67256 Template:Tlx 10 91 311 229 2015-07-03T03:07:39Z Be..anyone 0 -colon wikitext text/x-wiki {{[[{{#if:{{{SISTER|}}}|{{{SISTER}}}Template|{{ns:Template}}}}:{{{1|Tlx}}}|{{{1|Tlx}}}]]<!-- -->{{#if:{{{2|}}}|&#124;{{{2}}}}}<!-- -->{{#if:{{{3|}}}|&#124;{{{3}}}}}<!-- -->{{#if:{{{4|}}}|&#124;{{{4}}}}}<!-- -->{{#if:{{{5|}}}|&#124;{{{5}}}}}<!-- -->{{#if:{{{6|}}}|&#124;{{{6}}}}}<!-- -->{{#if:{{{7|}}}|&#124;{{{7}}}}}<!-- -->{{#if:{{{8|}}}|&#124;''...''}}}}<noinclude> {{documentation}} </noinclude> 31fa8846f3adf381b3a4943183ffd00c2489a2ff Template:Phpi 10 103 247 2015-07-08T17:29:43Z Krinkle 0 wikitext text/x-wiki {{inline-code|{{{1}}}|lang=php}}<noinclude> <templatedata> { "params": { "1": { "label": "Content", "description": "The PHP program code to be displayed.", "type": "string", "required": true } } } </templatedata> [[Category:Formatting templates]] </noinclude> 10be38885e779a372c5765a3b22ba9aaad06850e Template:Para 10 112 267 2015-08-25T09:13:25Z Hashar 0 7 revisions imported from [[:w:en:Template:Para]] wikitext text/x-wiki <code class="nowrap" {{#if:{{{plain|}}}|style="border:none;background-color:inherit;color:inherit;"}}>&#124;{{#if:{{{1|}}}|{{{1}}}&#61;}}{{{2|}}}</code><noinclude> {{Documentation}} <!--Categories and interwikis go near the bottom of the /doc subpage.--> </noinclude> 66770157bb51b0aabb5b874e4f1bb8f04c80915c Template:Tl 10 24 309 24 2015-08-25T09:13:34Z Hashar 0 4 revisions imported from [[:w:en:Template:Tl]] wikitext text/x-wiki #REDIRECT[[Template:Tlx]] 5d2f5bb7c52bc1bc7c1afe735011378ee521ec3c Template:Documentation 10 84 263 222 2015-09-07T15:29:45Z Paladox 0 Undo revision 1872326 by [[Special:Contributions/Krinkle|Krinkle]] ([[User talk:Krinkle|talk]]) Fixed problem now reverted part of the protection code in module:documentation. wikitext text/x-wiki {{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude> ce7fd93f18c46b4fa871bf679afd05cbda72d8c4 Template:Translation 10 139 327 2015-09-22T11:06:56Z Jdforrester (WMF) 0 Reverted edits by [[Special:Contributions/LisaNurmalaSari|LisaNurmalaSari]] ([[User talk:LisaNurmalaSari|talk]]) to last revision by [[User:This, that and the other|This, that and the other]] wikitext text/x-wiki {{#ifeq: {{lc:{{#titleparts:{{FULLPAGENAME}}|1|-1}}}}<!-- broken test; we should restrict to accept only subpages that could match a lowercase language code; keep any uppercase letter meaning not a language code --> | {{lc:{{#language:{{#titleparts:{{FULLPAGENAME}}|1|-1}}}}}}<!-- broken test; fails on some languages whose autonym is identical to their lowercase code --> | | /{{#titleparts:{{FULLPAGENAME}}|1|-1}} }}<noinclude> {{documentation}} [[Category:Translation]] </noinclude> df4871b4aa9beb7ee2f6e276d9819d0a4dfc4541 Template:ApiParam 10 127 299 2015-09-23T10:10:55Z Shirayuki 0 wikitext text/x-wiki <includeonly>*{{{bullet|}}} <code {{#if:{{{required|}}}|style="font-weight:bold"}}>{{{1|{{{name|}}}}}}</code>{{#if:{{{2|{{{description|}}}}}}|&#58; {{{2|{{{description|}}}}}}}}{{#if:{{{maxallowed|}}}|&#32;No more than {{{maxallowed}}} ({{{maxallowedbot|{{#switch:{{{maxallowed}}}|50=500|500=5000}}}}} for bots) allowed.}}{{#if:{{{type|}}}|&#32;'''Type''': {{{type}}}}}{{#if:{{{values|}}}|&#32;Possible values: {{{values}}}.}}{{#if:{{{default|}}}|&#32;(Default: {{{default}}})}}{{#if:{{{version|}}}|&#32;{{MW version-inline|{{{version}}}+}}}}{{#if:{{{deprecated|}}}|&#32;{{Deprecated-inline|{{{deprecated}}}}}}}{{#if:{{{removed|}}}|&#32;{{ {{TNTN|Removed-inline}} |{{{removed}}}}}}}</includeonly><noinclude> {{ {{TNTN|Documentation}} }} </noinclude> c3ec38a9643cc68da7d82786a2db6192c709f250 Template:Jsi 10 104 249 2015-09-25T06:16:04Z SPage (WMF) 0 document wikitext text/x-wiki {{inline-code|{{{1}}}|lang=javascript}}<noinclude> Invokes {{tl|inline-code}} with <code>lang=javascript</code> [[Category:Formatting templates]]</noinclude> 5830e6fb23f49e101e38b7861f4daa0304a55e40 Template:Inline-code 10 105 251 2015-09-25T06:18:13Z SPage (WMF) 0 document wikitext text/x-wiki {{#tag:syntaxhighlight|{{{1|input}}}|lang={{{lang|php}}}|enclose=none}}<noinclude> == Usage == : Some text, then <nowiki>{{Inline-code | 1=wfDebug( $text, $dest = 'all' );}}</nowiki> and more text. produces :Some text, then {{Inline-code | 1=wfDebug( $text, $dest = 'all' );}} and more text. [[Category:Formatting templates]]</noinclude> b60139d46d6d072f26f3ea63670145f9b31a9fe6 Template:Pagelang 10 138 325 2015-11-29T10:51:26Z Wiki13 0 Reverted edits by [[Special:Contributions/76.164.234.13|76.164.234.13]] ([[User talk:76.164.234.13|talk]]) to last revision by [[User:Stemoc|Stemoc]] wikitext text/x-wiki {{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{#titleparts:{{{1|{{PAGENAME}}}}}|1}}||{{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{lc:{{PAGENAME:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}|{{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{urlencode:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}|{{#ifeq:{{lc:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}|{{ucfirst:{{lc:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}||{{#switch:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|doc|layout|sandbox|testcases|init|preload=|#default={{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}}}}}}}<noinclude>{{Documentation}}</noinclude> 58a30c2368e3eec4f48178a05f99574a886ee439 Template:Dir 10 130 305 2015-12-03T20:32:06Z SVG 0 Protected "[[Template:Dir]]": Highly visible template: regular vandalism ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite)) wikitext text/x-wiki {{#switch:{{lc:{{{1|{{int:lang}}}}}}}|ar|arc|arz|azb|bcc|ckb|bqi|dv|fa|fa-af|glk|ha|he|kk-arab|kk-cn|ks|ku-arab|mzn|pnb|prd|ps|sd|ug|ur|ydd|yi={{{2|rtl}}}|{{{3|ltr}}}}}<noinclude>{{documentation}}</noinclude> 7d9c312af67f9eff96e7bdfce0f77cb52ca72aea Template:- 10 131 307 2015-12-05T03:38:08Z Matiia 0 Reverted edits by [[Special:Contributions/Henky anisyafrizal sabarudin|Henky anisyafrizal sabarudin]] ([[User talk:Henky anisyafrizal sabarudin|talk]]) to last revision by [[User:Matiia|Matiia]] wikitext text/x-wiki <br style="clear: {{{1|both}}};" /><noinclude> {{Documentation}}</noinclude> ff24c103813c340e95b3035eab8f1662c8649747 Template:Languages 10 134 317 2015-12-20T03:14:36Z Shirayuki 0 translation tweaks wikitext text/x-wiki {{nmbox | header = '''[[Project:Language policy|{{Languages/Title|{{SUBPAGENAME}}}}]]''' | text = '''[[{{{1|:{{NAMESPACE}}:{{BASEPAGENAME}}}}}|English]]''' {{Languages/Lang|af|{{{1|}}}| }}{{Languages/Lang|ar|{{{1|}}}| }}{{Languages/Lang|ast|{{{1|}}}| }}{{Languages/Lang|az|{{{1|}}}| }}{{Languages/Lang|bcc|{{{1|}}}| }}{{Languages/Lang|bg|{{{1|}}}| }}{{Languages/Lang|br|{{{1|}}}| }}{{Languages/Lang|bn|{{{1|}}}| }}{{Languages/Lang|bs|{{{1|}}}| }}{{Languages/Lang|ca|{{{1|}}}| }}{{Languages/Lang|cs|{{{1|}}}| }}{{Languages/Lang|da|{{{1|}}}| }}{{Languages/Lang|de|{{{1|}}}| }}{{Languages/Lang|diq|{{{1|}}}| }}{{Languages/Lang|el|{{{1|}}}| }}{{Languages/Lang|eo|{{{1|}}}| }}{{Languages/Lang|es|{{{1|}}}| }}{{Languages/Lang|fa|{{{1|}}}| }}{{Languages/Lang|fi|{{{1|}}}| }}{{Languages/Lang|fr|{{{1|}}}| }}{{Languages/Lang|gl|{{{1|}}}| }}{{Languages/Lang|gu|{{{1|}}}| }}{{Languages/Lang|he|{{{1|}}}| }}{{Languages/Lang|hi|{{{1|}}}| }}{{Languages/Lang|hu|{{{1|}}}| }}{{Languages/Lang|hy|{{{1|}}}| }}{{Languages/Lang|id|{{{1|}}}| }}{{Languages/Lang|io|{{{1|}}}| }}{{Languages/Lang|it|{{{1|}}}| }}{{Languages/Lang|ja|{{{1|}}}| }}{{Languages/Lang|ka|{{{1|}}}| }}{{Languages/Lang|kk|{{{1|}}}| }}<span class="autonym">{{Languages/Lang|km|{{{1|}}}| }}</span>{{Languages/Lang|ko|{{{1|}}}| }}{{Languages/Lang|ksh|{{{1|}}}| }}{{Languages/Lang|kw|{{{1|}}}| }}{{Languages/Lang|la|{{{1|}}}| }}{{Languages/Lang|min|{{{1|}}}| }}{{Languages/Lang|mk|{{{1|}}}| }}{{Languages/Lang|ml|{{{1|}}}| }}<span class="autonym">{{Languages/Lang|mr|{{{1|}}}| }}</span>{{Languages/Lang|ms|{{{1|}}}| }}{{Languages/Lang|nl|{{{1|}}}| }}{{Languages/Lang|no|{{{1|}}}| }}{{Languages/Lang|oc|{{{1|}}}| }}{{Languages/Lang|or|{{{1|}}}| }}{{Languages/Lang|pl|{{{1|}}}| }}{{Languages/Lang|pt|{{{1|}}}| }}{{Languages/Lang|pt-br|{{{1|}}}| }}{{Languages/Lang|ro|{{{1|}}}| }}{{Languages/Lang|ru|{{{1|}}}| }}{{Languages/Lang|si|{{{1|}}}| }}{{Languages/Lang|sk|{{{1|}}}| }}{{Languages/Lang|sl|{{{1|}}}| }}{{Languages/Lang|so|{{{1|}}}| }}{{Languages/Lang|sq|{{{1|}}}| }}{{Languages/Lang|sr|{{{1|}}}| }}{{Languages/Lang|sv|{{{1|}}}| }}{{Languages/Lang|ta|{{{1|}}}| }}{{Languages/Lang|th|{{{1|}}}| }}{{Languages/Lang|tr|{{{1|}}}| }}{{Languages/Lang|uk|{{{1|}}}| }}{{Languages/Lang|vi|{{{1|}}}| }}{{Languages/Lang|yi|{{{1|}}}| }}{{Languages/Lang|yue|{{{1|}}}| }}{{Languages/Lang|zh|{{{1|}}}| }}{{Languages/Lang|zh-hans|{{{1|}}}| }}{{Languages/Lang|zh-hant|{{{1|}}}| }}{{Languages/Lang|zh-tw|{{{1|}}}}}| }}<includeonly>{{#if:{{Languages/Lang|af|{{{1|}}}| }}{{Languages/Lang|ar|{{{1|}}}| }}{{Languages/Lang|ast|{{{1|}}}| }}{{Languages/Lang|az|{{{1|}}}| }}{{Languages/Lang|bcc|{{{1|}}}| }}{{Languages/Lang|bg|{{{1|}}}| }}{{Languages/Lang|br|{{{1|}}}| }}{{Languages/Lang|bn|{{{1|}}}| }}{{Languages/Lang|bs|{{{1|}}}| }}{{Languages/Lang|ca|{{{1|}}}| }}{{Languages/Lang|cs|{{{1|}}}| }}{{Languages/Lang|da|{{{1|}}}| }}{{Languages/Lang|de|{{{1|}}}| }}{{Languages/Lang|diq|{{{1|}}}| }}{{Languages/Lang|el|{{{1|}}}| }}{{Languages/Lang|eo|{{{1|}}}| }}{{Languages/Lang|es|{{{1|}}}| }}{{Languages/Lang|fa|{{{1|}}}| }}{{Languages/Lang|fi|{{{1|}}}| }}{{Languages/Lang|fr|{{{1|}}}| }}{{Languages/Lang|gl|{{{1|}}}| }}{{Languages/Lang|gu|{{{1|}}}| }}{{Languages/Lang|he|{{{1|}}}| }}{{Languages/Lang|hi|{{{1|}}}| }}{{Languages/Lang|hu|{{{1|}}}| }}{{Languages/Lang|hy|{{{1|}}}| }}{{Languages/Lang|id|{{{1|}}}| }}{{Languages/Lang|io|{{{1|}}}| }}{{Languages/Lang|it|{{{1|}}}| }}{{Languages/Lang|ja|{{{1|}}}| }}{{Languages/Lang|ka|{{{1|}}}| }}{{Languages/Lang|kk|{{{1|}}}| }}{{Languages/Lang|km|{{{1|}}}| }}{{Languages/Lang|ko|{{{1|}}}| }}{{Languages/Lang|ksh|{{{1|}}}| }}{{Languages/Lang|kw|{{{1|}}}| }}{{Languages/Lang|la|{{{1|}}}| }}{{Languages/Lang|min|{{{1|}}}| }}{{Languages/Lang|mk|{{{1|}}}| }}{{Languages/Lang|ml|{{{1|}}}| }}{{Languages/Lang|mr|{{{1|}}}| }}{{Languages/Lang|ms|{{{1|}}}| }}{{Languages/Lang|nl|{{{1|}}}| }}{{Languages/Lang|no|{{{1|}}}| }}{{Languages/Lang|oc|{{{1|}}}| }}{{Languages/Lang|or|{{{1|}}}| }}{{Languages/Lang|pl|{{{1|}}}| }}{{Languages/Lang|pt|{{{1|}}}| }}{{Languages/Lang|pt-br|{{{1|}}}| }}{{Languages/Lang|ro|{{{1|}}}| }}{{Languages/Lang|ru|{{{1|}}}| }}{{Languages/Lang|si|{{{1|}}}| }}{{Languages/Lang|sk|{{{1|}}}| }}{{Languages/Lang|sl|{{{1|}}}| }}{{Languages/Lang|so|{{{1|}}}| }}{{Languages/Lang|sq|{{{1|}}}| }}{{Languages/Lang|sr|{{{1|}}}| }}{{Languages/Lang|sv|{{{1|}}}| }}{{Languages/Lang|ta|{{{1|}}}| }}{{Languages/Lang|th|{{{1|}}}| }}{{Languages/Lang|tr|{{{1|}}}| }}{{Languages/Lang|uk|{{{1|}}}| }}{{Languages/Lang|vi|{{{1|}}}| }}{{Languages/Lang|yi|{{{1|}}}| }}{{Languages/Lang|yue|{{{1|}}}| }}{{Languages/Lang|zh|{{{1|}}}| }}{{Languages/Lang|zh-hans|{{{1|}}}| }}{{Languages/Lang|zh-hant|{{{1|}}}| }}{{Languages/Lang|zh-tw|{{{1|}}}}} ||[[Category:Languages pages without translations]]}}<!-- -->[[Category:Languages pages]]<!-- -->{{#ifeq:{{translation}}|/en||[[Category:Languages pages{{translation}}]]}}</includeonly><noinclude> {{ {{TNTN|documentation}} }} [[Category:Exclude in print]] </noinclude> aa0a3f30852c3d71ab7babadb5e80e3de93f2495 Main Page 0 1 1 2015-12-23T05:07:16Z MediaWiki default 0 wikitext text/x-wiki <strong>MediaWiki has been successfully installed.</strong> Consult the [//meta.wikimedia.org/wiki/Help:Contents User's Guide] for information on using the wiki software. == Getting started == * [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:Configuration_settings Configuration settings list] * [//www.mediawiki.org/wiki/Special:MyLanguage/Manual:FAQ MediaWiki FAQ] * [https://lists.wikimedia.org/mailman/listinfo/mediawiki-announce MediaWiki release mailing list] * [//www.mediawiki.org/wiki/Special:MyLanguage/Localisation#Translation_resources Localise MediaWiki for your language] 8e0aa2f2a7829587801db67d0424d9b447e09867 Target 0 2 2 2015-12-23T07:18:51Z Eddie 1 Created page with "{{#display_map: 32.477635895824065,-86.42840132117271~TARGET~ ~Target-icon-24.png~ALPHA; 32.47635327711175,-86.42690598964691~TARGET~ ~Target-icon-24.png~ALPHA |rectangles=32...." wikitext text/x-wiki {{#display_map: 32.477635895824065,-86.42840132117271~TARGET~ ~Target-icon-24.png~ALPHA; 32.47635327711175,-86.42690598964691~TARGET~ ~Target-icon-24.png~ALPHA |rectangles=32.47800306083119,-86.42626762390137:32.47609331733586,-86.42908930778503~link:http://j.mp/1SatLty }} 48a2b2aa6f5b53eb1fb8a83b29b988d3f5094374 Category:Hidden categories 14 3 3 2015-12-23T13:58:02Z Eddie 1 Created page with "This is the Hidden categories category." wikitext text/x-wiki This is the Hidden categories category. 8b2860dde47e23122f9a43d0e019c1a76b286b20 Cell system 0 4 4 2015-12-23T17:07:29Z Eddie 1 Created page with "{{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date..." wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] e11a1287df4560d6fa9f7e71aee143dd3155e94a :String 828 5 5 2015-12-23T21:25:25Z Eddie 1 Created page with "{{High-risk|2,600,000+}} {{ml|module=string}} This module is intended to provide access to basic string functions. Most of the functions provided here can be invoked with n..." wikitext text/x-wiki {{High-risk|2,600,000+}} {{ml|module=string}} This module is intended to provide access to basic string functions. Most of the functions provided here can be invoked with named parameters, unnamed parameters, or a mixture. If named parameters are used, Mediawiki will automatically remove any leading or trailing whitespace from the parameter. Depending on the intended use, it may be advantageous to either preserve or remove such whitespace. == Global options == ; ignore_errors : If set to 'true' or 1, any error condition will result in an empty string being returned rather than an error message. ; error_category : If an error occurs, specifies the name of a category to include with the error message. The default category is [[:Category:Errors reported by Module String]]. ; no_category : If set to 'true' or 1, no category will be added if an error is generated. Unit tests for this module are available at [[Module:String/testcases]]. == len == This function returns the length of the target string. Usage: : <code><nowiki>{{#invoke:</nowiki>String|len|''target_string''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|len|s= ''target_string'' }}</code> Parameters: ; s : The string whose length to report == sub == : This function returns a substring of the target string at specified indices. Usage: : <code><nowiki>{{#invoke:</nowiki>String|sub|''target_string''|''start_index''|''end_index''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|sub|s= ''target_string'' |i= ''start_index'' |j= ''end_index'' }}</code> Parameters: ; s : The string to return a subset of ; i : The first index of the substring to return, defaults to 1. ; j : The last index of the string to return, defaults to the last character. The first character of the string is assigned an index of 1. If either i or j is a negative value, it is interpreted the same as selecting a character by counting from the end of the string. Hence, a value of -1 is the same as selecting the last character of the string. If the requested indices are out of range for the given string, an error is reported. == sublength == This function implements the features of {{tl|Str sub old}} and is kept in order to maintain these older templates. == match == This function returns a substring from the source string that matches a specified pattern. Usage: : <code><nowiki>{{#invoke:</nowiki>String|match|''source_string''|''pattern_string''|''start_index''|''match_number''|''plain_flag''|''nomatch_output''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|match|s= ''source_string'' |pattern= ''pattern_string'' |start= ''start_index''|match= ''match_number''|plain= ''plain_flag'' |nomatch= ''nomatch_output'' }}</code> Parameters: ; s : The string to search ; pattern : The pattern or string to find within the string ; start : The index within the source string to start the search. The first character of the string has index 1. Defaults to 1. ; match : In some cases it may be possible to make multiple matches on a single string. This specifies which match to return, where the first match is match= 1. If a negative number is specified then a match is returned counting from the last match. Hence match = -1 is the same as requesting the last match. Defaults to 1. ; plain : A flag indicating that the pattern should be understood as plain text. Defaults to false. ; nomatch : If no match is found, output the "nomatch" value rather than an error. If the match_number or start_index are out of range for the string being queried, then this function generates an error. An error is also generated if no match is found. If one adds the parameter ignore_errors=true, then the error will be suppressed and an empty string will be returned on any failure. For information on constructing [[w:en:Lua (programming language)|Lua]] patterns, a form of [[w:en:regular expression|regular expression]], see: * [[mw:Extension:Scribunto/Lua_reference_manual#Patterns|Scribunto patterns]] * [[mw:Extension:Scribunto/Lua_reference_manual#Ustring_patterns|Scribunto Unicode string patterns]] == pos == This function returns a single character from the target string at position pos. Usage: : <code><nowiki>{{#invoke:</nowiki>String|pos|''target_string''|''index_value''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|pos|target= ''target_string'' |pos= ''index_value'' }}</code> Parameters: ; target : The string to search ; pos : The index for the character to return The first character has an index value of 1. If one requests a negative value, this function will select a character by counting backwards from the end of the string. In other words pos = -1 is the same as asking for the last character. A requested value of zero, or a value greater than the length of the string returns an error. == str_find == This function duplicates the behavior of {{tl|str_find}}, including all of its quirks. This is provided in order to support existing templates, but is NOT RECOMMENDED for new code and templates. New code is recommended to use the "find" function instead. Returns the first index in "source" that is a match to "target". Indexing is 1-based, and the function returns -1 if the "target" string is not present in "source". Important Note: If the "target" string is empty / missing, this function returns a value of "1", which is generally unexpected behavior, and must be accounted for separatetly. == find == This function allows one to search for a target string or pattern within another string. Usage: : <code><nowiki>{{#invoke:</nowiki>String|find|''source_str''|''target_string''|''start_index''|''plain_flag''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|find|source= ''source_str'' |target= ''target_str'' |start= ''start_index''|plain= ''plain_flag'' }}</code> Parameters: ; source : The string to search ; target : The string or pattern to find within source ; start : The index within the source string to start the search, defaults to 1 ; plain : Boolean flag indicating that target should be understood as plain text and not as a [[w:en:Lua (programming language)|Lua]]-style [[w:en:regular expression|regular expression]], defaults to true This function returns the first index >= "start" where "target" can be found within "source". Indices are 1-based. If "target" is not found, then this function returns 0. If either "source" or "target" are missing / empty, this function also returns 0. This function should be safe for UTF-8 strings. == replace == This function allows one to replace a target string or pattern within another string. Usage: : <code><nowiki>{{#invoke:</nowiki>String|replace|''source_str''|''pattern_string''|''replace_string''|''replacement_count''|''plain_flag''}}</code> OR : <code><nowiki>{{#invoke:</nowiki>String|replace|source= ''source_string'' |pattern= ''pattern_string''|replace= ''replace_string'' |count= ''replacement_count'' |plain= ''plain_flag'' }}</code> Parameters: ; source : The string to search ; pattern : The string or pattern to find within source ; replace : The replacement text ; count : The number of occurrences to replace; defaults to all ; plain : Boolean flag indicating that pattern should be understood as plain text and not as a [[mw:Extension:Scribunto/Lua reference manual#Ustring patterns|Scribunto ustring pattern]] (a unicode-friendly [[w:en:Lua (programming language)|Lua]]-style [[w:en:regular expression|regular expression]]); defaults to true == rep == Repeats a string ''n'' times. A simple function to pipe string.rep to templates. Usage: : <code><nowiki>{{#invoke:</nowiki>String|rep|''source''|''count''}}</code> Parameters: ; source : The string to repeat ; count : The number of repetitions. Example <code><nowiki>{{#invoke:String|rep|hello|3}}</nowiki></code> gives {{#invoke:String|rep|hello|3}}<includeonly>{{#ifeq:{{SUBPAGENAME}}|sandbox|| [[Category:Lua metamodules|String, {{PAGENAME}}]] }}</includeonly> aeadfc435482a98034a78c6fbd3428c4993a77d0 :String/testcases 828 6 6 2015-12-23T21:29:11Z Eddie 1 Created page with "local p = require('Module:UnitTests') function p:test_len() self:preprocess_equals_many('{{#invoke:String/sandbox|len|', '}}', { {' foo ', '5'}, {'s= foo..." wikitext text/x-wiki local p = require('Module:UnitTests') function p:test_len() self:preprocess_equals_many('{{#invoke:String/sandbox|len|', '}}', { {' foo ', '5'}, {'s= foo ', '3'}, {'', '0'}, {'s=', '0'}, {' ', '3'}, {'最近の更新', '5'}, }) end function p:test_replace() self:preprocess_equals_many('{{#invoke:String/sandbox|replace|', '}}', { {'1.1.1.1|.|/', '1/1/1/1'}, {'alpha (beta)| (| gamma (', 'alpha gamma (beta)'}, {'Dog (cat)|%s%(.*%)||plain=false', 'Dog'}, }) end function p:test_match() self:preprocess_equals_many('{{#invoke:String/sandbox|match|', '}}', { {'dog (cat)|%((%a-)%)', 'cat'}, {'dog (cat) (canary) (fish)|%((%a-)%)||-1', 'fish'}, {'dog (cat) (canary) (fish)|%((%a-)%)||2', 'canary'}, {'dog (cat) (canary) (fish)|%((%a-)%)|6|1', 'canary'}, {'dog (cat) (canary) (fish)|%((%a-)%)|6|2', 'fish'}, {'dog (cat)|%((%a-)%)||2|no_category=true', '<strong class="error">String Module Error: Match not found</strong>'}, {'dog (cat)|%((%a-)%)||2|ignore_errors=true', ''}, }) end function p:test_match() self:preprocess_equals_many('{{#invoke:String/sandbox|match|', '}}', { {'dog (cat)|%((%a-)%)', 'cat'}, {'dog (cat) (canary) (fish)|%((%a-)%)||-1', 'fish'}, {'dog (cat) (canary) (fish)|%((%a-)%)||2', 'canary'}, {'dog (cat) (canary) (fish)|%((%a-)%)|6|1', 'canary'}, {'dog (cat) (canary) (fish)|%((%a-)%)|6|2', 'fish'}, {'dog (cat)|%((%a-)%)||2|no_category=true', '<strong class="error">String Module Error: Match not found</strong>'}, {'dog (cat)|%((%a-)%)||2|ignore_errors=true', ''}, }) end function p:test_find() self:preprocess_equals_many('{{#invoke:String/sandbox|find|', '}}', { {'', '0'}, {'source=', '0'}, {'source=|target=', '0'}, {'source=|target=Bob', '0'}, {'Bob|Joe', '0'}, {'Bob|b', '3'}, {'Bob Joe|oe', '6'}, {'source= Bob |o', '2'}, {' Bob |o', '3'}, {'높지만 급격히|만', '3'}, {'source=BAAAB|target=%w|plain=false', '1'}, {'source=BAAAB|target=%w|start=3|plain=false', '3'}, {'source=BAAAB|target=(%w)%1|plain=false', '2'}, }) end function p:test_rep() self:preprocess_equals_many('{{#invoke:String/sandbox|rep|', '}}', { {'abc|1', 'abc'}, {'a b|7', 'a ba ba ba ba ba ba b'}, {'bla|glug|no_category=true', '<strong class="error">String Module Error: function rep expects a number as second parameter, received "glug"</strong>'}, {'bla|glug|ignore_errors=true', ''}, {'àèò|3', 'àèòàèòàèò'} }) end return p dcee5406dbfff66b0b94cef98554851ec273a9be Template:High-risk 10 7 7 2015-12-23T21:38:35Z Eddie 1 Created page with "{{ombox | type = content | image = [[File:Ambox warning orange.svg|40px|alt=|link=]] | text = '''This {{ #switch:{{NAMESPACE}} |Module=Lua module |#default=template }} is use..." wikitext text/x-wiki {{ombox | type = content | image = [[File:Ambox warning orange.svg|40px|alt=|link=]] | text = '''This {{ #switch:{{NAMESPACE}} |Module=Lua module |#default=template }} is used on <span class="plainlinks">[http://tools.wmflabs.org/templatecount/index.php?lang=en&namespace={{NAMESPACENUMBER:{{FULLPAGENAME}}}}&name={{urlencode:{{PAGENAME}}}} {{#if:{{{1|}}}|{{formatnum:{{{1}}}}}|a very large number of}} pages].'''</span><br />To avoid large-scale disruption and unnecessary server load, any changes to this {{ #switch:{{NAMESPACE}} |Module=module |#default=template }} should first be tested in its [[{{ #switch: {{SUBPAGENAME}} | doc | sandbox = {{SUBJECTSPACE}}:{{BASEPAGENAME}} | #default = {{SUBJECTPAGENAME}} }}/sandbox|/sandbox]] or [[{{ #switch: {{SUBPAGENAME}} | doc | sandbox = {{SUBJECTSPACE}}:{{BASEPAGENAME}} | #default = {{SUBJECTPAGENAME}} }}/testcases|/testcases]] subpages{{ #switch:{{NAMESPACE}} |Module=. |#default=, or in your own [[Wikipedia:Subpages#How to create user subpages|user subpage]]. }} The tested changes can then be added to this page in one single edit. Please consider discussing any changes on {{#if:{{{2|}}}|[[{{{2}}}]]|the [[{{ #switch: {{SUBPAGENAME}} | doc | sandbox = {{TALKSPACE}}:{{BASEPAGENAME}} | #default = {{TALKPAGENAME}} }}|talk page]]}} before implementing them. }}<noinclude> {{Documentation}} <!-- Add categories and interwikis to the /doc subpage, not here! --> </noinclude> 812c9e1a01722157b734340923858c7f7717eed3 Template:Ombox 10 8 8 2015-12-23T21:39:26Z Eddie 1 Created page with "{{#invoke:Message box|ombox}}<noinclude> {{documentation}} <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude" wikitext text/x-wiki {{#invoke:Message box|ombox}}<noinclude> {{documentation}} <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude f229f655ad42b3254e96c75d6dc0fa81f1a11412 Template:Ml 10 9 9 2015-12-23T21:40:46Z Eddie 1 Created page with "<includeonly>{{ml-multi|module={{{module|{{{1|}}}}}}|sandbox={{{sandbox|}}}}}</includeonly><noinclude> {{documentation}} </noinclude>" wikitext text/x-wiki <includeonly>{{ml-multi|module={{{module|{{{1|}}}}}}|sandbox={{{sandbox|}}}}}</includeonly><noinclude> {{documentation}} </noinclude> 54c7fac4a1a0391ab03c25b62d72dae899d2c02b Template:Ml-multi 10 10 10 2015-12-23T21:41:53Z Eddie 1 Created page with "<span class="plainlinks">[[Module:{{{module|{{{1|}}}}}}]]&nbsp;<!-- -->{{#if:{{{sup|}}} |<sup>}}<!-- -->{{Toolbar |style={{yesno|{{{small|yes}}}|yes=font-size:90%}} |separat..." wikitext text/x-wiki <span class="plainlinks">[[Module:{{{module|{{{1|}}}}}}]]&nbsp;<!-- -->{{#if:{{{sup|}}} |<sup>}}<!-- -->{{Toolbar |style={{yesno|{{{small|yes}}}|yes=font-size:90%}} |separator={{{separator|dot}}} | 1 = [[:Module talk:{{{module|}}}|talk]] | 2 = {{edit|1=Module:{{{module|}}}|2=edit}} | 3 = {{history|Module:{{{module|}}}|hist}} | 4 = [{{fullurl:Special:WhatLinksHere/:Module:{{{module|}}}|limit=999}} links] | 5 = [[Module:{{{module|{{{1|}}}}}}/doc|doc]] | 6 = [[Special:PrefixIndex/Module:{{{module|}}}|subpages]] | 7 = [[Module:{{{module|}}}/testcases|tests]]&nbsp;([[Module talk:{{{module|}}}/testcases|results]]) | 8 = {{#if:{{{sandbox<includeonly>|</includeonly>}}} | {{Ml-multi/sandboxlinks |module={{{module|{{{1|}}}}}} |project={{{project|}}} |sandbox={{{sandbox|}}} }} }} }}<!-- -->{{#if:{{{sup|}}} |</sup>}}<!-- --></span><noinclude> {{Documentation}} </noinclude> 7f316b30a42de662b1b9381f7c9853d8ebc680fb Template:Reflist 10 11 11 2015-12-23T21:45:58Z Eddie 1 Created page with "<div class="reflist <!-- -->{{#if: {{{1|}}} | columns {{#iferror: {{#ifexpr: {{{1|1}}} > 1 }} | references-column-width | references-column-count references-..." wikitext text/x-wiki <div class="reflist <!-- -->{{#if: {{{1|}}} | columns {{#iferror: {{#ifexpr: {{{1|1}}} > 1 }} | references-column-width | references-column-count references-column-count-{{#if:1|{{{1}}}}} }} | {{#if: {{{colwidth|}}} | references-column-width }} }}" style="<!-- -->{{#if: {{{1|}}} | {{#iferror: {{#ifexpr: {{{1|1}}} > 1 }} | {{column-width|{{#if:1|{{{1}}}}}}} | {{column-count|{{#if:1|{{{1}}}}}}} }} | {{#if: {{{colwidth|}}} | {{column-width|{{{colwidth}}}}} }} }} list-style-type: <!-- -->{{{liststyle|{{#switch: {{{group|}}} | upper-alpha | upper-roman | lower-alpha | lower-greek | lower-roman = {{{group}}} | #default = decimal}}}}};"> {{#tag:references|{{{refs|}}}|group={{{group|}}}}}</div><noinclude> {{Documentation}} </noinclude> 262fc11f5c62a7ad95b8d0d03383b362c2bb43b0 File:Wdip-Cell-0.png 6 12 12 2015-12-23T21:55:23Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Wnoc-Cell-0.png 6 13 13 2015-12-23T21:57:56Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Wnoc-Cell-1.png 6 14 14 2015-12-23T21:59:08Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:T-Cell-0.png 6 15 15 2015-12-23T22:00:07Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:T-Cell-1.png 6 16 16 2015-12-23T22:00:57Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:T-Cell-2.png 6 17 17 2015-12-23T22:01:43Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Template:For 10 18 18 2015-12-23T22:04:47Z Eddie 1 Created page with "{{Hatnote|For {{#if:{{{1|}}}|{{{1}}}|other uses}}, see [[:{{{2|{{PAGENAME}} (disambiguation)}}}]]{{#if:{{{3|}}}|{{#if:{{{4|}}}|, [[:{{{3}}}]], {{#if:{{{5|}}}|[[:{{{4}}}]], and..." wikitext text/x-wiki {{Hatnote|For {{#if:{{{1|}}}|{{{1}}}|other uses}}, see [[:{{{2|{{PAGENAME}} (disambiguation)}}}]]{{#if:{{{3|}}}|{{#if:{{{4|}}}|, [[:{{{3}}}]], {{#if:{{{5|}}}|[[:{{{4}}}]], and [[:{{{5}}}]]|and [[:{{{4}}}]]}}|&#32;and [[:{{{3}}}]]}}}}.}}<noinclude> {{Documentation}} </noinclude> c3931828e393f43a1a8d0da3ebde9254fd266463 Template:Hatnote 10 19 19 2015-12-23T22:05:41Z Eddie 1 Created page with "{{Hatnote|For {{#if:{{{1|}}}|{{{1}}}|other uses}}, see [[:{{{2|{{PAGENAME}} (disambiguation)}}}]]{{#if:{{{3|}}}|{{#if:{{{4|}}}|, [[:{{{3}}}]], {{#if:{{{5|}}}|[[:{{{4}}}]], and..." wikitext text/x-wiki {{Hatnote|For {{#if:{{{1|}}}|{{{1}}}|other uses}}, see [[:{{{2|{{PAGENAME}} (disambiguation)}}}]]{{#if:{{{3|}}}|{{#if:{{{4|}}}|, [[:{{{3}}}]], {{#if:{{{5|}}}|[[:{{{4}}}]], and [[:{{{5}}}]]|and [[:{{{4}}}]]}}|&#32;and [[:{{{3}}}]]}}}}.}}<noinclude> {{Documentation}} </noinclude> c3931828e393f43a1a8d0da3ebde9254fd266463 Template:Multiple issues 10 20 20 2015-12-23T22:07:37Z Eddie 1 Created page with "{{Ambox |name = Multiple issues |doc = no |subst = <includeonly>{{subst:substcheck}}</includeonly> |class = ambox-multiple_issues compact-ambox |type = content |text = <t..." wikitext text/x-wiki {{Ambox |name = Multiple issues |doc = no |subst = <includeonly>{{subst:substcheck}}</includeonly> |class = ambox-multiple_issues compact-ambox |type = content |text = <table class="collapsible {{#ifeq:{{{collapsed}}}|yes|collapsed}}" style="width:95%; background:transparent;"> <tr><th style="text-align:left; padding:0.2em 2px 0.2em 0;"> This {{#if:{{{section|}}}|section|article}} has multiple issues. <span style="font-weight: normal;">Please help '''[{{fullurl:{{FULLPAGENAME}}|action=edit}} improve it]''' or discuss these issues on the '''[[{{TALKPAGENAME}}|talk page]]'''.</span></th></tr> <tr><td>{{#invoke:String|replace|source={{{1|}}}|pattern=style="display: none"|replace=|count=}} </td></tr></table> {{#ifeq:{{{2|a}}}|{{{2|b}}}|[[Category:Pages using multiple issues with incorrect parameters|§{{PAGENAME}}]] }}{{#invoke:Check for unknown parameters|check|unknown=[[Category:Pages using multiple issues with incorrect parameters|_VALUE_{{PAGENAME}}]] | collapsed | section | 1 | 2 }} }}<noinclude> {{Documentation}} </noinclude> fef905b904bc5a39ff609f6332e3d5198639c3fb :Math 828 21 21 2015-12-23T22:16:38Z Eddie 1 Created page with "--[[ This module provides a number of basic mathematical operations. ]] local yesno, getArgs -- lazily initialized local p = {} -- Holds functions to be returned from #inv..." wikitext text/x-wiki --[[ This module provides a number of basic mathematical operations. ]] local yesno, getArgs -- lazily initialized local p = {} -- Holds functions to be returned from #invoke, and functions to make available to other Lua modules. local wrap = {} -- Holds wrapper functions that process arguments from #invoke. These act as intemediary between functions meant for #invoke and functions meant for Lua. --[[ Helper functions used to avoid redundant code. ]] local function err(msg) -- Generates wikitext error messages. return mw.ustring.format('<strong class="error">Formatting error: %s</strong>', msg) end local function unpackNumberArgs(args) -- Returns an unpacked list of arguments specified with numerical keys. local ret = {} for k, v in pairs(args) do if type(k) == 'number' then table.insert(ret, v) end end return unpack(ret) end local function makeArgArray(...) -- Makes an array of arguments from a list of arguments that might include nils. local args = {...} -- Table of arguments. It might contain nils or non-number values, so we can't use ipairs. local nums = {} -- Stores the numbers of valid numerical arguments. local ret = {} for k, v in pairs(args) do v = p._cleanNumber(v) if v then nums[#nums + 1] = k args[k] = v end end table.sort(nums) for i, num in ipairs(nums) do ret[#ret + 1] = args[num] end return ret end local function applyFuncToArgs(func, ...) -- Use a function on all supplied arguments, and return the result. The function must accept two numbers as parameters, -- and must return a number as an output. This number is then supplied as input to the next function call. local vals = makeArgArray(...) local count = #vals -- The number of valid arguments if count == 0 then return -- Exit if we have no valid args, otherwise removing the first arg would cause an error. nil, 0 end local ret = table.remove(vals, 1) for _, val in ipairs(vals) do ret = func(ret, val) end return ret, count end --[[ random Generate a random number Usage: {{#invoke: Math | random }} {{#invoke: Math | random | maximum value }} {{#invoke: Math | random | minimum value | maximum value }} ]] function wrap.random(args) local first = p._cleanNumber(args[1]) local second = p._cleanNumber(args[2]) return p._random(first, second) end function p._random(first, second) math.randomseed(mw.site.stats.edits + mw.site.stats.pages + os.time() + math.floor(os.clock() * 1000000000)) -- math.random will throw an error if given an explicit nil parameter, so we need to use if statements to check the params. if first and second then if first <= second then -- math.random doesn't allow the first number to be greater than the second. return math.random(first, second) end elseif first then return math.random(first) else return math.random() end end --[[ order Determine order of magnitude of a number Usage: {{#invoke: Math | order | value }} ]] function wrap.order(args) local input_string = (args[1] or args.x or '0'); local input_number = p._cleanNumber(input_string); if input_number == nil then return err('order of magnitude input appears non-numeric') else return p._order(input_number) end end function p._order(x) if x == 0 then return 0 end return math.floor(math.log10(math.abs(x))) end --[[ precision Detemines the precision of a number using the string representation Usage: {{ #invoke: Math | precision | value }} ]] function wrap.precision(args) local input_string = (args[1] or args.x or '0'); local trap_fraction = args.check_fraction; local input_number; if not yesno then yesno = require('Module:Yesno') end if yesno(trap_fraction, true) then -- Returns true for all input except nil, false, "no", "n", "0" and a few others. See [[Module:Yesno]]. local pos = string.find(input_string, '/', 1, true); if pos ~= nil then if string.find(input_string, '/', pos + 1, true) == nil then local denominator = string.sub(input_string, pos+1, -1); local denom_value = tonumber(denominator); if denom_value ~= nil then return math.log10(denom_value); end end end end input_number, input_string = p._cleanNumber(input_string); if input_string == nil then return err('precision input appears non-numeric') else return p._precision(input_string) end end function p._precision(x) if type(x) == 'number' then x = tostring(x) end x = string.upper(x) local decimal = x:find('%.') local exponent_pos = x:find('E') local result = 0; if exponent_pos ~= nil then local exponent = string.sub(x, exponent_pos + 1) x = string.sub(x, 1, exponent_pos - 1) result = result - tonumber(exponent) end if decimal ~= nil then result = result + string.len(x) - decimal return result end local pos = string.len(x); while x:byte(pos) == string.byte('0') do pos = pos - 1 result = result - 1 if pos <= 0 then return 0 end end return result end --[[ max Finds the maximum argument Usage: {{#invoke:Math| max | value1 | value2 | ... }} Note, any values that do not evaluate to numbers are ignored. ]] function wrap.max(args) return p._max(unpackNumberArgs(args)) end function p._max(...) local function maxOfTwo(a, b) if a > b then return a else return b end end local max_value = applyFuncToArgs(maxOfTwo, ...) if max_value then return max_value end end --[[ min Finds the minimum argument Usage: {{#invoke:Math| min | value1 | value2 | ... }} OR {{#invoke:Math| min }} When used with no arguments, it takes its input from the parent frame. Note, any values that do not evaluate to numbers are ignored. ]] function wrap.min(args) return p._min(unpackNumberArgs(args)) end function p._min(...) local function minOfTwo(a, b) if a < b then return a else return b end end local min_value = applyFuncToArgs(minOfTwo, ...) if min_value then return min_value end end --[[ average Finds the average Usage: {{#invoke:Math| average | value1 | value2 | ... }} OR {{#invoke:Math| average }} Note, any values that do not evaluate to numbers are ignored. ]] function wrap.average(args) return p._average(unpackNumberArgs(args)) end function p._average(...) local function getSum(a, b) return a + b end local sum, count = applyFuncToArgs(getSum, ...) if not sum then return 0 else return sum / count end end --[[ round Rounds a number to specified precision Usage: {{#invoke:Math | round | value | precision }} --]] function wrap.round(args) local value = p._cleanNumber(args[1] or args.value or 0) local precision = p._cleanNumber(args[2] or args.precision or 0) if value == nil or precision == nil then return err('round input appears non-numeric') else return p._round(value, precision) end end function p._round(value, precision) local rescale = math.pow(10, precision or 0); return math.floor(value * rescale + 0.5) / rescale; end --[[ mod Implements the modulo operator Usage: {{#invoke:Math | mod | x | y }} --]] function wrap.mod(args) local x = p._cleanNumber(args[1]) local y = p._cleanNumber(args[2]) if not x then return err('first argument to mod appears non-numeric') elseif not y then return err('second argument to mod appears non-numeric') else return p._mod(x, y) end end function p._mod(x, y) local ret = x % y if not (0 <= ret and ret < y) then ret = 0 end return ret end --[[ gcd Calculates the greatest common divisor of multiple numbers Usage: {{#invoke:Math | gcd | value 1 | value 2 | value 3 | ... }} --]] function wrap.gcd(args) return p._gcd(unpackNumberArgs(args)) end function p._gcd(...) local function findGcd(a, b) local r = b local oldr = a while r ~= 0 do local quotient = math.floor(oldr / r) oldr, r = r, oldr - quotient * r end if oldr < 0 then oldr = oldr * -1 end return oldr end local result, count = applyFuncToArgs(findGcd, ...) return result end --[[ precision_format Rounds a number to the specified precision and formats according to rules originally used for {{template:Rnd}}. Output is a string. Usage: {{#invoke: Math | precision_format | number | precision }} ]] function wrap.precision_format(args) local value_string = args[1] or 0 local precision = args[2] or 0 return p._precision_format(value_string, precision) end function p._precision_format(value_string, precision) -- For access to Mediawiki built-in formatter. local lang = mw.getContentLanguage(); local value value, value_string = p._cleanNumber(value_string) precision = p._cleanNumber(precision) -- Check for non-numeric input if value == nil or precision == nil then return err('invalid input when rounding') end local current_precision = p._precision(value) local order = p._order(value) -- Due to round-off effects it is neccesary to limit the returned precision under -- some circumstances because the terminal digits will be inaccurately reported. if order + precision >= 14 then orig_precision = p._precision(value_string) if order + orig_precision >= 14 then precision = 13 - order; end end -- If rounding off, truncate extra digits if precision < current_precision then value = p._round(value, precision) current_precision = p._precision(value) end local formatted_num = lang:formatNum(math.abs(value)) local sign -- Use proper unary minus sign rather than ASCII default if value < 0 then sign = '−' else sign = '' end -- Handle cases requiring scientific notation if string.find(formatted_num, 'E', 1, true) ~= nil or math.abs(order) >= 9 then value = value * math.pow(10, -order) current_precision = current_precision + order precision = precision + order formatted_num = lang:formatNum(math.abs(value)) else order = 0; end formatted_num = sign .. formatted_num -- Pad with zeros, if needed if current_precision < precision then local padding if current_precision <= 0 then if precision > 0 then local zero_sep = lang:formatNum(1.1) formatted_num = formatted_num .. zero_sep:sub(2,2) padding = precision if padding > 20 then padding = 20 end formatted_num = formatted_num .. string.rep('0', padding) end else padding = precision - current_precision if padding > 20 then padding = 20 end formatted_num = formatted_num .. string.rep('0', padding) end end -- Add exponential notation, if necessary. if order ~= 0 then -- Use proper unary minus sign rather than ASCII default if order < 0 then order = '−' .. lang:formatNum(math.abs(order)) else order = lang:formatNum(order) end formatted_num = formatted_num .. '<span style="margin:0 .15em 0 .25em">×</span>10<sup>' .. order .. '</sup>' end return formatted_num end --[[ Helper function that interprets the input numerically. If the input does not appear to be a number, attempts evaluating it as a parser functions expression. ]] function p._cleanNumber(number_string) if type(number_string) == 'number' then -- We were passed a number, so we don't need to do any processing. return number_string, tostring(number_string) elseif type(number_string) ~= 'string' or not number_string:find('%S') then -- We were passed a non-string or a blank string, so exit. return nil, nil; end -- Attempt basic conversion local number = tonumber(number_string) -- If failed, attempt to evaluate input as an expression if number == nil then local success, result = pcall(mw.ext.ParserFunctions.expr, number_string) if success then number = tonumber(result) number_string = tostring(number) else number = nil number_string = nil end else number_string = number_string:match("^%s*(.-)%s*$") -- String is valid but may contain padding, clean it. number_string = number_string:match("^%+(.*)$") or number_string -- Trim any leading + signs. if number_string:find('^%-?0[xX]') then -- Number is using 0xnnn notation to indicate base 16; use the number that Lua detected instead. number_string = tostring(number) end end return number, number_string end --[[ Wrapper function that does basic argument processing. This ensures that all functions from #invoke can use either the current frame or the parent frame, and it also trims whitespace for all arguments and removes blank arguments. ]] local mt = { __index = function(t, k) return function(frame) if not getArgs then getArgs = require('Module:Arguments').getArgs end return wrap[k](getArgs(frame)) -- Argument processing is left to Module:Arguments. Whitespace is trimmed and blank arguments are removed. end end } return setmetatable(p, mt) d19d14a98e92fe25b60a9b87561498b620889504 :Random 828 22 22 2015-12-23T22:19:35Z Eddie 1 Created page with "-- This module contains a number of functions that make use of random numbers. local cfg = {} -------------------------------------------------------------------------------..." wikitext text/x-wiki -- This module contains a number of functions that make use of random numbers. local cfg = {} -------------------------------------------------------------------------------------- -- Configuration -------------------------------------------------------------------------------------- -- Set this to true if your wiki has a traffic rate of less than one edit every two minutes or so. -- This will prevent the same "random" number being generated many times in a row until a new edit is made -- to the wiki. This setting is only relevant if the |same= parameter is set. cfg.lowTraffic = false -- If cfg.lowTraffic is set to true, and the |same= parameter is set, this value is used for the refresh rate of the random seed. -- This is the number of seconds until the seed is changed. Getting this right is tricky. If you set it too high, the same number -- will be returned many times in a row. If you set it too low, you may get different random numbers appearing on the same page, -- particularly for pages that take many seconds to process. cfg.seedRefreshRate = 60 -------------------------------------------------------------------------------------- -- End configuration -------------------------------------------------------------------------------------- local p = {} -- For functions available from other Lua modules. local l = {} -- For functions not available from other Lua modules, but that need to be accessed using table keys. local yesno = require('Module:Yesno') local makeList = require('Module:List').makeList -------------------------------------------------------------------------------------- -- Helper functions -------------------------------------------------------------------------------------- local function raiseError(msg) -- This helps to generate a wikitext error. It is the calling function's responsibility as to how to include it in the output. return mw.ustring.format('<b class="error">[[Module:Random]] error: %s.</b>', msg) end -------------------------------------------------------------------------------------- -- random number function -------------------------------------------------------------------------------------- local function getBigRandom(l, u) -- Gets a random integer between l and u, and is not limited to RAND_MAX. local r = 0 local n = 2^math.random(30) -- Any power of 2. local limit = math.ceil(53 / (math.log(n) / math.log(2))) for i = 1, limit do r = r + math.random(0, n - 1) / (n^i) end return math.floor(r * (u - l + 1)) + l end function l.number(args) -- Gets a random number. first = tonumber(args[1]) second = tonumber(args[2]) -- This needs to use if statements as math.random won't accept explicit nil values as arguments. if first then if second then if first > second then -- Second number cannot be less than the first, or it causes an error. first, second = second, first end return getBigRandom(first, second) else return getBigRandom(1, first) end else return math.random() end end -------------------------------------------------------------------------------------- -- Date function -------------------------------------------------------------------------------------- function l.date(args) -- This function gets random dates, and takes timestamps as positional arguments. -- With no arguments specified, it outputs a random date in the current year. -- With two arguments specified, it outputs a random date between the timestamps. -- With one argument specified, the date is a random date between the unix epoch (1 Jan 1970) and the timestamp. -- The output can be formatted using the "format" argument, which works in the same way as the #time parser function. -- The default format is the standard Wikipedia timestamp. local lang = mw.language.getContentLanguage() local function getDate(format, ts) local success, date = pcall(lang.formatDate, lang, format, ts) if success then return date end end local function getUnixTimestamp(ts) local unixts = getDate('U', ts) if unixts then return tonumber(unixts) end end local t1 = args[1] local t2 = args[2] -- Find the start timestamp and the end timestamp. local startTimestamp, endTimestamp if not t1 then -- Find the first and last second in the current year. local currentYear = tonumber(getDate('Y')) local currentYearStartUnix = tonumber(getUnixTimestamp('1 Jan ' .. tostring(currentYear))) local currentYearEndUnix = tonumber(getUnixTimestamp('1 Jan ' .. tostring(currentYear + 1))) - 1 startTimestamp = '@' .. tostring(currentYearStartUnix) -- @ is used to denote Unix timestamps with lang:formatDate. endTimestamp = '@' .. tostring(currentYearEndUnix) elseif t1 and not t2 then startTimestamp = '@0' -- the Unix epoch, 1 January 1970 endTimestamp = t1 elseif t1 and t2 then startTimestamp = t1 endTimestamp = t2 end -- Get Unix timestamps and return errors for bad input (or for bugs in the underlying PHP library, of which there are unfortunately a few) local startTimestampUnix = getUnixTimestamp(startTimestamp) local endTimestampUnix = getUnixTimestamp(endTimestamp) if not startTimestampUnix then return raiseError('"' .. tostring(startTimestamp) .. '" was not recognised as a valid timestamp') elseif not endTimestampUnix then return raiseError('"' .. tostring(endTimestamp) .. '" was not recognised as a valid timestamp') elseif startTimestampUnix > endTimestampUnix then return raiseError('the start date must not be later than the end date (start date: "' .. startTimestamp .. '", end date: "' .. endTimestamp .. '")') end -- Get a random number between the two Unix timestamps and return it using the specified format. local randomTimestamp = getBigRandom(startTimestampUnix, endTimestampUnix) local dateFormat = args.format or 'H:i, d F Y (T)' local result = getDate(dateFormat, '@' .. tostring(randomTimestamp)) if result then return result else return raiseError('"' .. dateFormat .. '" is not a valid date format') end end -------------------------------------------------------------------------------------- -- List functions -------------------------------------------------------------------------------------- local function randomizeArray(t, limit) -- Randomizes an array. It works by iterating through the list backwards, each time swapping the entry -- "i" with a random entry. Courtesy of Xinhuan at http://forums.wowace.com/showthread.php?p=279756 -- If the limit parameter is set, the array is shortened to that many elements after being randomized. -- The lowest possible value is 0, and the highest possible is the length of the array. local len = #t for i = len, 2, -1 do local r = math.random(i) t[i], t[r] = t[r], t[i] end if limit and limit < len then local ret = {} for i, v in ipairs(t) do if i > limit then break end ret[i] = v end return ret else return t end end local function removeBlanks(t) -- Removes blank entries from an array so that it can be used with ipairs. local ret = {} for k, v in pairs(t) do if type(k) == 'number' then table.insert(ret, k) end end table.sort(ret) for i, v in ipairs(ret) do ret[i] = t[v] end return ret end local function makeSeparator(sep) if sep == 'space' then -- Include an easy way to use spaces as separators. return ' ' elseif sep == 'newline' then -- Ditto for newlines return '\n' elseif type(sep) == 'string' then -- If the separator is a recognised MediaWiki separator, use that. Otherwise use the value of sep if it is a string. local mwseparators = {'dot', 'pipe', 'comma', 'tpt-languages'} for _, mwsep in ipairs(mwseparators) do if sep == mwsep then return mw.message.new( sep .. '-separator' ):plain() end end return sep end end local function makeRandomList(args) local list = removeBlanks(args) list = randomizeArray(list, tonumber(args.limit)) return list end function l.item(args) -- Returns a random item from a numbered list. local list = removeBlanks(args) local len = #list if len >= 1 then return list[math.random(len)] end end function l.list(args) -- Randomizes a list and concatenates the result with a separator. local list = makeRandomList(args) local sep = makeSeparator(args.sep or args.separator) return table.concat(list, sep) end function l.text_list(args) -- Randomizes a list and concatenates the result, text-style. Accepts separator and conjunction arguments. local list = makeRandomList(args) local sep = makeSeparator(args.sep or args.separator) local conj = makeSeparator(args.conj or args.conjunction) return mw.text.listToText(list, sep, conj) end function l.array(args) -- Returns a Lua array, randomized. For use from other Lua modules. return randomizeArray(args.t, args.limit) end -------------------------------------------------------------------------------------- -- HTML list function -------------------------------------------------------------------------------------- function l.html_list(args, listType) -- Randomizes a list and turns it into an HTML list. Uses [[Module:List]]. listType = listType or 'bulleted' local listArgs = makeRandomList(args) -- Arguments for [[Module:List]]. for k, v in pairs(args) do if type(k) == 'string' then listArgs[k] = v end end return makeList(listType, listArgs) end -------------------------------------------------------------------------------------- -- The main function. Called from other Lua modules. -------------------------------------------------------------------------------------- function p.main(funcName, args, listType) -- Sets the seed for the random number generator and passes control over to the other functions. local same = yesno(args.same) if not same then -- Generates a different number every time the module is called, even from the same page. -- This is because of the variability of os.clock (the time in seconds that the Lua script has been running for). math.randomseed(mw.site.stats.edits + mw.site.stats.pages + os.time() + math.floor(os.clock() * 1000000000)) else if not cfg.lowTraffic then -- Make the seed as random as possible without using anything time-based. This means that the same random number -- will be generated for the same input from the same page - necessary behaviour for some wikicode templates that -- assume bad pseudo-random-number generation. local stats = mw.site.stats local views = stats.views or 0 -- This is not always available, so we need a backup. local seed = views + stats.pages + stats.articles + stats.files + stats.edits + stats.users + stats.activeUsers + stats.admins -- Make this as random as possible without using os.time() or os.clock() math.randomseed(seed) else -- Make the random seed change every n seconds, where n is set by cfg.seedRefreshRate. -- This is useful for low-traffic wikis where new edits may not happen very often. math.randomseed(math.floor(os.time() / cfg.seedRefreshRate)) end end if type(args) ~= 'table' then error('the second argument to p.main must be a table') end return l[funcName](args, listType) end -------------------------------------------------------------------------------------- -- Process arguments from #invoke -------------------------------------------------------------------------------------- local function makeWrapper(funcName, listType) -- This function provides a wrapper for argument-processing from #invoke. -- listType is only used with p.html_list, and is nil the rest of the time. return function (frame) -- If called via #invoke, use the args passed into the invoking template, or the args passed to #invoke if any exist. -- Otherwise assume args are being passed directly in from the debug console or from another Lua module. local origArgs if frame == mw.getCurrentFrame() then origArgs = frame:getParent().args for k, v in pairs(frame.args) do origArgs = frame.args break end else origArgs = frame end -- Trim whitespace and remove blank arguments. local args = {} for k, v in pairs(origArgs) do if type(v) == 'string' then v = mw.text.trim(v) end if v ~= '' then args[k] = v end end return p.main(funcName, args, listType) end end -- Process arguments for HTML list functions. local htmlListFuncs = { bulleted_list = 'bulleted', unbulleted_list = 'unbulleted', horizontal_list = 'horizontal', ordered_list = 'ordered', horizontal_ordered_list = 'horizontal_ordered' } for funcName, listType in pairs(htmlListFuncs) do p[funcName] = makeWrapper('html_list', listType) end -- Process arguments for other functions. local otherFuncs = {'number', 'date', 'item', 'list', 'text_list'} for _, funcName in ipairs(otherFuncs) do p[funcName] = makeWrapper(funcName) end return p ee35eaddf353b9f1503193207f6eade28db3c086 :List 828 23 23 2015-12-23T22:20:36Z Eddie 1 Created page with "-- This module outputs different kinds of lists. At the moment, bulleted, -- unbulleted, horizontal, ordered, and horizontal ordered lists are supported. local libUtil = requ..." wikitext text/x-wiki -- This module outputs different kinds of lists. At the moment, bulleted, -- unbulleted, horizontal, ordered, and horizontal ordered lists are supported. local libUtil = require('libraryUtil') local checkType = libUtil.checkType local mTableTools = require('Module:TableTools') local p = {} local listTypes = { ['bulleted'] = true, ['unbulleted'] = true, ['horizontal'] = true, ['ordered'] = true, ['horizontal_ordered'] = true } function p.makeListData(listType, args) -- Constructs a data table to be passed to p.renderList. local data = {} -- Classes data.classes = {} if listType == 'horizontal' or listType == 'horizontal_ordered' then table.insert(data.classes, 'hlist') elseif listType == 'unbulleted' then table.insert(data.classes, 'plainlist') end table.insert(data.classes, args.class) -- Main div style data.style = args.style -- Indent for horizontal lists if listType == 'horizontal' or listType == 'horizontal_ordered' then local indent = tonumber(args.indent) indent = indent and indent * 1.6 or 0 if indent > 0 then data.marginLeft = indent .. 'em' end end -- List style types for ordered lists -- This could be "1, 2, 3", "a, b, c", or a number of others. The list style -- type is either set by the "type" attribute or the "list-style-type" CSS -- property. if listType == 'ordered' or listType == 'horizontal_ordered' then data.listStyleType = args.list_style_type or args['list-style-type'] data.type = args['type'] -- Detect invalid type attributes and attempt to convert them to -- list-style-type CSS properties. if data.type and not data.listStyleType and not tostring(data.type):find('^%s*[1AaIi]%s*$') then data.listStyleType = data.type data.type = nil end end -- List tag type if listType == 'ordered' or listType == 'horizontal_ordered' then data.listTag = 'ol' else data.listTag = 'ul' end -- Start number for ordered lists data.start = args.start if listType == 'horizontal_ordered' then -- Apply fix to get start numbers working with horizontal ordered lists. local startNum = tonumber(data.start) if startNum then data.counterReset = 'listitem ' .. tostring(startNum - 1) end end -- List style -- ul_style and ol_style are included for backwards compatibility. No -- distinction is made for ordered or unordered lists. data.listStyle = args.list_style -- List items -- li_style is included for backwards compatibility. item_style was included -- to be easier to understand for non-coders. data.itemStyle = args.item_style or args.li_style data.items = {} for i, num in ipairs(mTableTools.numKeys(args)) do local item = {} item.content = args[num] item.style = args['item' .. tostring(num) .. '_style'] or args['item_style' .. tostring(num)] item.value = args['item' .. tostring(num) .. '_value'] or args['item_value' .. tostring(num)] table.insert(data.items, item) end return data end function p.renderList(data) -- Renders the list HTML. -- Return the blank string if there are no list items. if type(data.items) ~= 'table' or #data.items < 1 then return '' end -- Render the main div tag. local root = mw.html.create('div') for i, class in ipairs(data.classes or {}) do root:addClass(class) end root:css{['margin-left'] = data.marginLeft} if data.style then root:cssText(data.style) end -- Render the list tag. local list = root:tag(data.listTag or 'ul') list :attr{start = data.start, type = data.type} :css{ ['counter-reset'] = data.counterReset, ['list-style-type'] = data.listStyleType } if data.listStyle then list:cssText(data.listStyle) end -- Render the list items for i, t in ipairs(data.items or {}) do local item = list:tag('li') if data.itemStyle then item:cssText(data.itemStyle) end if t.style then item:cssText(t.style) end item :attr{value = t.value} :wikitext(t.content) end return tostring(root) end function p.renderTrackingCategories(args) local isDeprecated = false -- Tracks deprecated parameters. for k, v in pairs(args) do k = tostring(k) if k:find('^item_style%d+$') or k:find('^item_value%d+$') then isDeprecated = true break end end local ret = '' if isDeprecated then ret = ret .. '[[Category:List templates with deprecated parameters]]' end return ret end function p.makeList(listType, args) if not listType or not listTypes[listType] then error(string.format( "bad argument #1 to 'makeList' ('%s' is not a valid list type)", tostring(listType) ), 2) end checkType('makeList', 2, args, 'table') local data = p.makeListData(listType, args) local list = p.renderList(data) local trackingCategories = p.renderTrackingCategories(args) return list .. trackingCategories end for listType in pairs(listTypes) do p[listType] = function (frame) local mArguments = require('Module:Arguments') local origArgs = mArguments.getArgs(frame) -- Copy all the arguments to a new table, for faster indexing. local args = {} for k, v in pairs(origArgs) do args[k] = v end return p.makeList(listType, args) end end return p 913ea46e6c4b4825b443da53158be6d6260b349d Template:Tl 10 24 24 2015-12-23T22:42:32Z Eddie 1 Created page with "&#123;&#123;[[Template:{{{1}}}|{{{1}}}]]&#125;&#125;<noinclude> {{documentation}} <!-- Categories go on the /doc subpage and interwikis go on Wikidata. --> </noinclude>" wikitext text/x-wiki &#123;&#123;[[Template:{{{1}}}|{{{1}}}]]&#125;&#125;<noinclude> {{documentation}} <!-- Categories go on the /doc subpage and interwikis go on Wikidata. --> </noinclude> 91be693cd63410db06fc933eddb412ba433564dc Template:Meeting Minutes/Files 10 25 25 2015-12-24T15:36:50Z Eddie 1 Created page with "<noinclude> This is the "Meeting Minutes/Files" template. It should be called in the following format: <pre> {{Meeting Minutes/Files }} </pre> Edit the page to see the templat..." wikitext text/x-wiki <noinclude> This is the "Meeting Minutes/Files" template. It should be called in the following format: <pre> {{Meeting Minutes/Files }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 54217178b983b76607d84aa804ce1b68824b297e 26 25 2015-12-24T15:37:41Z Eddie 1 wikitext text/x-wiki * {{File link | file={{{File or URL|}}} | alt={{{Alternate name|}}} }}<br /> e3aaacc900ef1de1f5c2c00650719a884d8ada8d Template:File link 10 26 27 2015-12-24T15:40:00Z Eddie 1 Created page with "<noinclude>'''Template:File link''' is an alternate method of linking to files in this wiki. It allows all file linking, both to local wiki files and external files, to be per..." wikitext text/x-wiki <noinclude>'''Template:File link''' is an alternate method of linking to files in this wiki. It allows all file linking, both to local wiki files and external files, to be performed with one method. See '''[[Help:Linking to files]]''' for a tutorial. == Local Files == For local files use the format below. Note that the "alt" parameter is optional. <pre> {{File link | file=File:International Space Station.pdf | alt=ISS Presentation }} (note, this file has to exist for it to display properly) </pre> The above wikitext displays as {{File link | file=File:International Space Station.pdf | alt=ISS Presentation }}. Note the "file info" link. There has been confusion with some wiki users who click on file links which bring them to another wiki page instead of directly to the file. Using this method, the major link will bring them directly to the file, whereas the "file info" link will bring them to the page where they can see the file upload history and upload new versions of the file. If the local file does not exist, the output will look like {{File link | file=File:My Fictitious File.doc | alt=Alt name won't show }} == External Files == For external files use the format below. Make sure to include <nowiki>http://</nowiki> or <nowiki>https://</nowiki> at the beginning of the URL. Again the "alt" parameter is optional, but it will look ugly without it in this case. <pre> {{File link | file=http://example.com/somefile.pdf | alt=My File }} </pre> The above wikitext displays as {{File link | file=http://example.com/somefile.pdf | alt=My File }}. Note that there is no "file info" link, since the EVA Wiki has no such info for external files. </noinclude><includeonly><!-- # # DETERMINES if the filename is a local file or an external file # #pos returns 0 if "File:" is found at the beginning of the string # returns nothing if "File:" is not found in the string, or a number other than zero if found later in the string # -->{{#ifeq: 0 | {{#pos:{{{file}}}|File:}} | <!-- # # if filename starts with "File:" # --><span style="white-space:nowrap;">{{#ifexist:{{{file}}}<!-- -->|[[Media:{{#replace:{{{file}}}|File:}}|{{#if: {{{alt|}}} | {{{alt}}} | {{#replace:{{{file}}}|File:}} }}]]<sup> <nowiki>[</nowiki>[[:{{{file}}}|file info]]<nowiki>]</nowiki></sup>|<!-- -->[[{{{file}}}]]}}</span>|<!-- # # If does not start with "File:" # NOTE: the #if statement trims whitespace off of the URL...stupid hack # -->[{{#if:{{{file|}}}|{{{file|}}} }} {{{alt|}}}]<!-- # # Close out ifeq function # -->}}</includeonly> f01abbf6a0c0035ca11e3fe9ea554b946eb5ede8 File:Sitcen.jpg 6 27 28 2015-12-24T15:48:04Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Category:Title Icon Category 14 29 30 2015-12-24T20:24:26Z Eddie 1 Created page with "This is the Title Icon Category category." wikitext text/x-wiki This is the Title Icon Category category. f9840688d1bb0cc7979982d2f13cdd86233c66f7 31 30 2015-12-24T20:27:56Z Eddie 1 wikitext text/x-wiki This category sets a value for [[Property:Title Icon]]. {{#set: Title Icon=Framework.png}}<noinclude>[[Category:Framework Pages]]</noinclude> 7fec597f4401371f6c0b948a309ebc3f57c3d1e3 Property:Title Icon 102 30 32 2015-12-24T20:28:37Z Eddie 1 Created page with "This is a property of type [[Has type::Text]]. [[Category:Framework Pages]]" wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b File:Framework.png 6 31 33 2015-12-24T20:31:07Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Category:Framework Pages 14 32 34 2015-12-24T20:32:25Z Eddie 1 Created page with "Framework Pages __HIDDENCAT__" wikitext text/x-wiki Framework Pages __HIDDENCAT__ c2c086712a5b10017084f7d5d0d461e5aa2658fd Template:Meeting 10 33 35 2015-12-24T21:19:24Z Eddie 1 Created page with "<noinclude> This is the "Meeting" template. It should be called in the following format: <pre> {{Meeting }} </pre> Edit the page to see the template text. </noinclude><include..." wikitext text/x-wiki <noinclude> This is the "Meeting" template. It should be called in the following format: <pre> {{Meeting }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> cb388a6f63ac0705d3c3daaf098f99547cd2b17c 36 35 2015-12-24T21:19:38Z Eddie 1 wikitext text/x-wiki <includeonly><!-- # Template:Meeting # (1) Setup JS/CSS and category # (2) Add category # (3) Create wrapper div around infobox and table of contents # (4) Create infobox # (5) Close out wrapper div # (6) Show overview of meeting # (7) #ask query for recent meetings # (8) Show link to form # (9) Template documentation (noinclude) # # (1) Call the #meetingminutestemplate parser function in order to add # the required javascript and CSS to the meeting template (uses same # parser function as Template:Meeting minutes. # -->{{#meetingminutestemplate:}}<!-- # # (2) Add Category:Meeting Minutes. # -->[[Category:Meeting]]<!-- # # (3) Add wrapper <div> which will go around infobox and table of contents. # This allows the infobox and TOC to both be positioned on the left and # be approximately the same size. FIXME: make them exactly the same size # --><div id="ext-meeting-minutes-toc-wrapper"><!-- # # (4) Create infobox # --> {| class="meeting-minutes-infobox" ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}}</big> |- ! Standard day | {{#if: {{{Standard day|}}} | [[Standard day::{{{Standard day|}}}]] | }} |- ! Standard time | {{#if: {{{Standard time|}}} | [[Standard time::{{{Standard time|}}}]] | }} |- ! Building | {{#if: {{{Building|}}} | [[Building::{{{Building|}}}]] | }} |- ! Room | {{#if: {{{Room|}}} | [[Room::{{{Room|}}}]] | }} |- ! Call-in number | {{#if: {{{Call-in number|}}} | [[Call in number::{{{Call-in number|}}}]] | }} |- ! Call-in password | {{#if: {{{Call-in password|}}} | [[Call in password::{{{Call-in password|}}}]] | }} |- ! Managed by cadre(s) | {{#arraymap:{{{Managed by cadre(s)|}}}|,|x|[[Managed by cadre::x]]}} |- ! Notable attendee(s) | {{#arraymap:{{{Notable attendee(s)|}}}|,|x|[[Notable attendee::User:x]]}} |} <!-- # # Note: no TOC in Template:Meeting at this time. could add __TOC__ here if desired. # # # (5) Close out <div> wrapper around infobox and TOC # --></div><!-- # # (6) Show overview of meeting # -->{{#if: {{{Overview|}}} | {{{Overview}}}{{#set: Overview ={{{Overview}}} }} | <!-- else do nothing --> }}<!-- # # (7) Perform #ask query to show recent meetings # --><h2>Recent Meetings</h2> {{#ask: [[Category:Meeting Minutes]] [[Meeting type::{{PAGENAME}}]] | ?Meeting date = Date | ?Notes taken by | sort = Meeting date | order = desc | limit = 10 | default = No meetings of this type have been added }} <!-- leave blank lines above # # (8) Add link to meeting minutes form # -->[[Special:FormEdit/Meeting Minutes|Add Meeting Minutes]]<!-- # # (9) Template definition complete. Template documentation below (within noinclude). # --></includeonly><noinclude> This is the "Meeting" template. It should be called in the following format: <pre> {{Meeting |Standard day= |Standard time= |Building= |Room= |Call-in number= |Call-in password= |Managed by cadre(s)= |Notable attendee(s)= }} </pre> Edit the page to see the template text. </noinclude> 9cc8140e41e6d05bf68a2d7c6d3fab0495676280 Form:Meeting Minutes 106 34 37 2015-12-24T21:20:51Z Eddie 1 Created page with "<noinclude> This is the "Meeting Minutes" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form..." wikitext text/x-wiki <noinclude> This is the "Meeting Minutes" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Meeting Minutes}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Meeting}}} {| class="formtable" ! Standard day: | {{{field|Standard day}}} |- ! Standard time: | {{{field|Standard time}}} |- ! Building: | {{{field|Building}}} |- ! Room: | {{{field|Room}}} |- ! Call-in number: | {{{field|Call-in number}}} |- ! Call-in password: | {{{field|Call-in password}}} |- ! Managed by cadre(s): | {{{field|Managed by cadre(s)}}} |- ! Notable attendee(s): | {{{field|Notable attendee(s)}}} |- ! Overview: | {{{field|Overview}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> ea6987463ddf4aae900a9f59d159315f686f76c8 38 37 2015-12-24T21:21:06Z Eddie 1 wikitext text/x-wiki <includeonly>{{#meetingminutesform:}}__NOTOC__{{{info|page name=<Meeting minutes[Meeting type]> - <Meeting minutes[Meeting date]>}}} <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Meeting minutes}}}<!-- Main Form Definition --> <div class="meeting-minutes-save-often"> <h3>Remember...</h3> '''[[Help:Save Often|Save often]]''' or '''[[Help:Text Editor|use a text editor]]'''. Revisions are free. Also, if there is ''anything'' you don't know how to do, see the '''[[Help:Meeting Minutes|help page]]''' for more info. </div> <h2>Meeting Details</h2> <div class="meeting-minutes-edit-section multipleTemplateInstance"> {| class="formtable meeting-minutes-formtable" ! Meeting name | {{{field|Meeting type|input type=combobox|values from category=Meeting|mandatory}}} |- ! Meeting date | {{{field|Meeting date|mandatory}}} |- ! Start time | {{{field|Start time hour|maxlength=2|input type=text|size=2|mandatory}}} : {{{field|Start time minute|maxlength=2|input type=text|size=2|mandatory}}} (24-hour time, please) |- ! Notes taken by | {{{field|Notes taken by|input type=text with autocomplete|values from namespace=User|mandatory|class=meeting-minutes-author-field}}} |} </div> <h2>Meeting Files</h2> {{{field|Meeting files|holds template}}}<!-- --><h1 style="margin-top:30px;">Meeting Topics</h1> {{{field|Topics|holds template}}} {{{end template}}}<!-- Topics -->{{{for template|Topic from meeting|multiple|embed in field=Meeting minutes[Topics]|add button text=Add Topic}}}<div class="instance-wrapper"> {{{field|Has topic title|class=full-width no-links-allowed title-input-field|placeholder=Topic Title}}} {{{field|Related article|list|class=full-width no-links-allowed|input type=text with autocomplete|values from namespace=Main|placeholder=Related articles}}} {{{field|Full text|input type=textarea|autogrow|class=full-width shrink-on-blur emphasize meeting-topic-full-text|cols=75}}} </div>{{{end template}}}<!-- Meeting Files (uploads and external files) -->{{{for template|Meeting Minutes/Files|multiple|embed in field=Meeting minutes[Meeting files]|add button text=Add File}}} <div class="mti-help-box mti-hide-on-blur"> Local files must be uploaded first. See [[Help:Meeting Minutes|the help page]] for more info. </div> {| class="formtable meeting-minutes-formtable" ! Local File Name or URL | {{{field|File or URL|class=full-width no-links-allowed|placeholder=Enter filename starting with File: or URL starting with http}}} |- ! Alternate name | {{{field|Alternate name|class=full-width no-links-allowed}}} |} {{{end template}}}<!-- --> == Free text == {{Collapsible | Content = * '''Use this field ''very'' sparingly''' * Nothing in this field will be distributed to related pages * Info in this field will be added to the end of the meeting minutes page {{{standard input|free text|rows=10}}} | Collapse text = Hide Free Text | Expand text = Show Free Text Entry | Start hidden = true }} == Save Page == {{Collapsible | Content = * '''Summary:''' Not required, but recommended if making a revision to a page. The summary will be included emails sent to people watching this page. * '''Minor edit checkbox:''' Not required * '''Watch this page checkbox:''' Check this box. If you are editing this page, in all likelihood you care about the content. Watch the page to have greater visibility into future changes. You can make it so the box is automatically checked by editing your preferences (top right of the screen). For more info see [[Help:Watching Pages]]. * '''Save page:''' Click this when you're done to save the page. * '''Show preview:''' Click this to see what your wiki-markup will look like when formatted. Very handy for learning how to use the wiki. * '''Show changes:''' Shows all changes you've made, compared to the previous revision (doesn't do much when creating a brand new page). * '''Cancel:''' Don't click this unless you want to lose what you've been working on. | Collapse text = Hide Help | Expand text = Show Help | Start hidden = true }} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly><!-- Below is content only shown on the Form:Meeting Minutes page --><noinclude> This is the "Meeting Minutes" form. Click edit to make changes to the structure of the form itself. Or [[Special:FormEdit/Meeting_Minutes|create new meeting minutes]].<!--{{#forminput:form=Meeting Minutes}}--></noinclude> ed1a0526883e36ac0732abd9754a0c025ef09f77 Template:Meeting Minutes Block 10 35 39 2015-12-24T21:24:25Z Eddie 1 Created page with "<noinclude> This is the "Meeting Minutes Block" template. It should be called in the following format: <pre> {{Meeting Minutes Block }} </pre> Edit the page to see the templat..." wikitext text/x-wiki <noinclude> This is the "Meeting Minutes Block" template. It should be called in the following format: <pre> {{Meeting Minutes Block }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 9b42a32d937ad3943122655f1ee6f7894b30311b Template:Template:Meeting topic and synopsis bullet 10 36 40 2015-12-24T21:25:16Z Eddie 1 Created page with "<noinclude> This is the "Template:Meeting topic and synopsis bullet" template. It should be called in the following format: <pre> {{Template:Meeting topic and synopsis bullet..." wikitext text/x-wiki <noinclude> This is the "Template:Meeting topic and synopsis bullet" template. It should be called in the following format: <pre> {{Template:Meeting topic and synopsis bullet }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 2e99a272b2644037b72d0c115813e046c3452271 41 40 2015-12-24T21:25:34Z Eddie 1 wikitext text/x-wiki <noinclude> <pre> {{{1|}}} = topic title {{{2|}}} = synopsis {{{3|}}} = From page </pre> </noinclude><includeonly>* '''{{{1|}}}:''' {{{2|}}} {{#ifeq:{{Ends with|{{{2|}}}|...}}|true|<small>'''''[[{{{3|}}}|more]]'''''</small>|}} </includeonly> 582535fd28a9d3b06d8cf2d35c31ef94ce7490a0 Template:Meeting Minutes Block info for table row 10 37 42 2015-12-24T21:26:06Z Eddie 1 Created page with "<noinclude> This is the "Meeting Minutes Block info for table row" template. It should be called in the following format: <pre> {{Meeting Minutes Block info for table row }} <..." wikitext text/x-wiki <noinclude> This is the "Meeting Minutes Block info for table row" template. It should be called in the following format: <pre> {{Meeting Minutes Block info for table row }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 91cc4c5c4906462e3367d15d35518e85bb891a00 Template:Meeting Minutes Block info for table row 10 37 43 42 2015-12-24T21:26:31Z Eddie 1 wikitext text/x-wiki <noinclude> <pre> {{{1|}}} = Meeting page title (i.e. {{PAGENAME}} for meeting) {{{2|}}} = Meeting type (Tools Panel, FIAR Call, etc...not full name of page like "EVA Tools Panel - 23 August 2012") {{{3|}}} = Meeting date </pre> </noinclude><includeonly><tr><td><table class="main-page-meeting-minutes-row" style="width:100%;padding:5px;border:1px solid #cccccc;margin:10px 0px 0px 0px;"><tr><th>'''[[{{{1|}}}|{{{2|}}}]]''' ({{{3|}}})</th></tr> <tr><td>{{#ask: [[Has topic title::+]][[From page::{{{1|}}}]] |mainlabel=- |? Has topic title |? Synopsis |? From page |sort=Index |link=none |format = template |template = Meeting topic and synopsis bullet }}</td></tr></table></td></tr></includeonly> 1a3eb6dcece75f69b975e1622d52f57534c5fe0d File:Network-300x226.jpg 6 38 44 2015-12-25T02:59:47Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Main Page 0 1 45 1 2015-12-25T03:04:50Z Eddie 1 Replaced content with "== Reachback == [[File:Network-300x226.jpg|thumbnail]]" wikitext text/x-wiki == Reachback == [[File:Network-300x226.jpg|thumbnail]] fbbc4e6bd2d874dc1dcf5cba496bf20f0567805b 46 45 2015-12-25T03:06:03Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' [[File:Network-300x226.jpg|thumbnail]] 1348ea1c4fe47c091e893d8c00654c78432ef1e1 47 46 2015-12-25T03:06:37Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Network-300x226.jpg|thumbnail]] e069600586ccf3141396b27717ace86f9257482b 48 47 2015-12-25T03:09:33Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Network-300x226.jpg|220px|thumbnail|link= ]] 5e1a09384db275e91ed895e4de7ed9f1784f62f7 52 48 2015-12-26T22:45:47Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple-Feeds.png|framed|left]] e6d2cb7d8cbc5cdbdfb4537beda154a9078e26d4 53 52 2015-12-26T22:47:23Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple feeds.png|framed|left|link= ]] 3ca313794cb8d1ce932894fcda90ffb13f379bb1 54 53 2015-12-26T22:48:59Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple Feeds.png|thumbnail|link= ]] e1e9f0675b5e60fd2a21d3f34a4891fbfd78d35f 55 54 2015-12-26T22:50:00Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple Feeds.png|right|thumbnail|link= ]] 13271a683242ed58ecc7ead5d0a9d61616c87b70 56 55 2015-12-26T22:50:26Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple Feeds.png|left|thumbnail|link= ]] f6754e853489733572882b575b271dfa3a0ccc6c 57 56 2015-12-26T22:51:07Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple Feeds.png|left|framed|link= ]] 8b7ec5081294629c9b499fe7283d87c3d36d510b 58 57 2015-12-26T22:51:41Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ '''Reachback''' <br /> [[File:Multiple Feeds.png|left|frameless|link= ]] ca26ef99338b9e054e3ef52970f9bed18356d0f0 59 58 2015-12-26T22:52:38Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] 21c96901eafa0e4982352fa58e52f05476d2cf92 76 59 2015-12-27T00:29:43Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=target.png}} 9b83b8800bec128729d0e3fed1c8db25a409fc2c File:Multiple Feeds.png 6 39 49 2015-12-26T02:03:37Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 MediaWiki:Common.css 8 40 50 2015-12-26T11:09:51Z Eddie 1 Created page with "/* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hi..." css text/css /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } 415b0e66372f8ec98fff3c44fb2b82385d376ed4 MediaWiki:Sidebar 8 41 51 2015-12-26T11:31:14Z Eddie 1 Created page with " * navigation ** mainpage|mainpage-description ** helppage|help * SEARCH * TOOLBOX * LANGUAGES" wikitext text/x-wiki * navigation ** mainpage|mainpage-description ** helppage|help * SEARCH * TOOLBOX * LANGUAGES 62efb54c1c76f7bfb77fafa741b67679b637f753 MediaWiki:Mainpage 8 42 60 2015-12-26T22:58:29Z Eddie 1 Created page with "Reachback Operations" wikitext text/x-wiki Reachback Operations 3d85bfa9802f24e97b6a8e8a5f6c999fc392f9ce Reachback Operations 0 43 61 2015-12-26T23:04:16Z Eddie 1 Created page with "__NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] [[Related to::Information Operations]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}}" wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] [[Related to::Information Operations]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} edd01fe335fbf34a8f1f68e0f532a9bef9e25268 63 61 2015-12-26T23:05:51Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{Related to::Information Operations}} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} 9605545ad0a33be4250ef911331b49ed5d9ff823 64 63 2015-12-26T23:07:17Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} [[Related to::Information Operations]] e97013e3e33609bbea833f24633bb2985f427a03 65 64 2015-12-26T23:19:10Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} [[Related to::Information Operations]] {{#set:Title Icon={{PAGENAME}}.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} a688108c2054e15f8ae43c38bcef3690f5ca1e4b 66 65 2015-12-26T23:20:51Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon={{PAGENAME}}.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} fc0bb73cccec406043dae8549d61867364890a27 74 66 2015-12-26T23:33:01Z Eddie 1 Eddie moved page [[Reachback Operations]] to [[Reachback Support Operations]] wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon={{PAGENAME}}.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} fc0bb73cccec406043dae8549d61867364890a27 77 74 2015-12-27T00:41:25Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Support}} {{#set:Title Icon={{PAGENAME}}.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} ed49ba3281b68ce27cbaa2f2fa041055def4c696 79 77 2015-12-27T00:43:31Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Support}} {{#set:Title Icon=semwiki.jpg}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} cffe8c0d28af386598f79226d73de8d56705002b 82 79 2015-12-27T00:49:47Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Support}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} e79e12a9da957b8372ee100af169eab0c62200c7 91 82 2015-12-27T05:21:21Z Eddie 1 Eddie moved page [[Reachback Support Operations]] to [[Reachback Operations]] over a redirect without leaving a redirect wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Support}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} e79e12a9da957b8372ee100af169eab0c62200c7 92 91 2015-12-27T05:22:14Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} aef711c440627ddaf0aac3bf6c2570d4ad474381 Property:Information Operations 102 44 62 2015-12-26T23:05:09Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 File:Reachback Operations.png 6 45 67 2015-12-26T23:23:57Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 68 67 2015-12-26T23:24:32Z Eddie 1 Eddie moved page [[File:Operations.png]] to [[File:Reachback Operations.png]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Property:Name 102 46 69 2015-12-26T23:26:45Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 70 69 2015-12-26T23:27:11Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::String]] 7e2c6f7066c8ebe862e43dd1615f0f8ba032382c Property:Hierarchy Data 102 47 71 2015-12-26T23:28:30Z Eddie 1 Created a property of type [[Has type::Code]] wikitext text/x-wiki This is a property of type [[Has type::Code]]. 6f45f32988880c7b04366a0b6d289e6358daddd8 Property:Related to 102 48 72 2015-12-26T23:29:32Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Property:Full Title 102 49 73 2015-12-26T23:31:08Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 File:Reachback Support Operations.png 6 51 78 2015-12-27T00:42:03Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Target-icon.png 6 52 80 2015-12-27T00:48:06Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 81 80 2015-12-27T00:49:08Z Eddie 1 Eddie moved page [[File:Target-1.png]] to [[File:Target-icon.png]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Cell system 0 4 83 4 2015-12-27T01:20:54Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http://www.cimacell.com/wiki| Structure] 21fb2abfb61af519af0475aba332a66b543ed9ba 84 83 2015-12-27T01:22:19Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http://www.cimacell.com/wiki Structure] 7b3c2a89499405c85c9ff35d234f9d5187be2a33 85 84 2015-12-27T01:30:42Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http:/www.cimacell.com/wiki/index.php?title=Structure Reachback Operations] 73f8623863babfda3c289283fb63f2ac68a72d71 86 85 2015-12-27T01:32:29Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [[http:/www.cimacell.com/wiki/index.php?title=Structure|Reachback Ops]] 2b500473b925e3ea87fa96669fa7cf002ee6fa22 87 86 2015-12-27T01:33:44Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http:/www.cimacell.com/wiki/index.php?title=Structure Reachback Ops] 0d76002833887b7aaac78333dcb9c1d0708207a2 88 87 2015-12-27T01:34:25Z Eddie 1 wikitext text/x-wiki {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http://www.cimacell.com/wiki/index.php?title=Structure Reachback Ops] 0891f4ea30f20cf531adbd72ac5f1baaf89bb9e8 89 88 2015-12-27T01:37:26Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http://www.cimacell.com/wiki/index.php?title=Structure Reachback Ops] fb5a1d844ca4bdb97864146cb93843feaf88a994 93 89 2015-12-27T20:08:08Z Eddie 1 Eddie moved page [[Clandestine cell system]] to [[Cell system]] without leaving a redirect wikitext text/x-wiki __NOEDITSECTION__ {{for|the general use of a cellular structure by an organization, such as by a business|Cellular organization (disambiguation)}} {{redirect|Sleeper cell}} {{Use dmy dates|date=July 2011}} {{multiple issues| {{Essay-like|date=July 2011}} {{POV|date=September 2012}} {{Original research|date=January 2015}} {{cleanup|reason=Poorly written, poorly referenced, marked essay-like (mostly user Hcberkowitz's edits; see page history) and POV issues and generally underlinked|date=January 2015}} {{cleanup-rewrite|date=January 2015}} {{Expert-subject|date=January 2015}} }} {{terrorism}} A '''clandestine cell''' structure is a method for organizing a group of people like [[French resistance|resistance]] fighters or terrorists in such a way that it can more effectively resist penetration by an opposing organization (e.g., a law enforcement organization). In a cell structure, each small group of people in the cell only know the identities of the people in their cell; as such, if a cell member is apprehended and interrogated, he or she will not know the identities of the higher-ranking individuals in the organization. Depending on the group's [[philosophy]], its operational area, the communications technologies available, and the nature of the mission, it can range from a strict hierarchy to an extremely distributed organization. It is also a method used by [[organized crime|criminal organizations]], [[undercover]] operatives, and unconventional warfare (UW) units led by [[special forces]]. Historically, clandestine organizations have avoided electronic communications, because [[signals intelligence]] is a strength of conventional militaries and counterintelligence organizations.{{citation needed|date=August 2012}} In the context of [[tradecraft]], [[covert operation|covert]] and [[clandestine operation|clandestine]] are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", while covert means "deniable". The adversary is aware that a covert activity is happening, but does not know who is doing it, and certainly not their sponsorship. Clandestine activities, however, if successful, are completely unknown to the adversary, and their function, such as espionage, would be neutralized if there was any awareness of the activity. A '''sleeper cell''' refers to a cell, or isolated grouping of [[sleeper agent]]s that lies dormant until it receives orders or decides to act. ==History== === Provisional Irish Republican Army=== As opposed to the [[French Resistance]], the modern [[Provisional Irish Republican Army]] (PIRA) has a history going back to Irish revolutionary forces in the early 20th century, but has little external control. Its doctrine and organization have changed over time, given factors such as the independence of 26 of Ireland's 32 counties, the continued British control of Northern Ireland and the simple passage of time and changes in contemporary thinking and technology.<ref name=Leahy>{{cite web | url = http://cgsc.cdmhost.com/cgi-bin/showfile.exe?CISOROOT=/p4013coll2&CISOPTR=386&filename=387.pdf |format=PDF| author = Leahy, Kevin C. | year = 2005 | title = The Impact of Technology on the Command, Control, and Organizational Structure of Insurgent Groups | accessdate=2007-12-04 }}</ref> Officially, the PIRA is hierarchical, but, especially as British security forces became more effective, changed to a semiautonomous model for its operational and certain of its support cells (e.g., transportation, intelligence, cover and security).<ref name=GreenBook>{{cite web | url = https://web.archive.org/web/20110606012137/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html | author = Irish Republican Army | title = The Green Book | accessdate=2007-12-04 |archiveurl=https://web.archive.org/web/20070616132240/http://uk.geocities.com/oglaigh_na_heireann32/THE_GREEN_BOOK.html|archivedate=2007-06-16}}</ref> Its leadership sees itself as guiding and consensus-building. The lowest-level cells, typically of 2-5 people, tend to be built by people with an existing personal relationship. British counterinsurgents could fairly easily understand the command structure, but not the workings of the operational cells. The IRA has an extensive network of inactive or sleeper cells, so new ''ad hoc'' organizations may appear for any specific operation. ===World War II French Resistance=== In World War II, [[Operation Jedburgh]] teams parachuted into occupied France to lead unconventional warfare units.<ref name=Hall>{{cite book | author = Hall, Roger | title = You're Stepping on my Cloak and Dagger | publisher = Bantam Books | year =1964 }}</ref><ref name=SOETO>{{cite book | chapterurl = http://www.history.army.mil/books/wwii/70-42/70-423.htm | chapter = Chapter 3: Special Operations in the European Theater | publisher = [[United States Army Center of Military History]] | url = http://www.history.army.mil/books/wwii/70-42/70-42c.htm | title = U.S. Army Special Operations in World War II | first = David W. | last = Hogan | id = CMH Pub 70-42 |year = 1992 | location = Washington, D.C. }}</ref> They would be composed of two officers, one American or British, and the other French, the latter preferably from the area into which they landed. The third member of the team was a radio operator. Especially through the French member, they would contact trusted individuals in the area of operation, and ask them to recruit a team of trusted subordinates (i.e., a subcell). If the team mission were sabotage, reconnaissance, or espionage, there was no need to meet in large units. If the team was to carry out direct action, often an unwise mission unless an appreciable number of the locals had military experience, it would be necessary to assemble into units for combat. Even then, the hideouts of the leadership were known only to subcell leaders. The legitimacy of the Jedburgh team came from its known affiliation with Allied powers, and it was a structure more appropriate for UW than for truly clandestine operations. ===National Front for the Liberation of South Vietnam=== Also known as the [[Viet Cong]], this organization grew from earlier anticolonial groups fighting the French, as well as anti-Japanese guerillas during World War II.<ref name=VietCong>{{cite book | author = Pike, Douglas | title = Viet Cong: Organization and Technique of the National Liberation Front of South Vietnam | publisher = MIT Press | year = 1970 }}</ref> Its command, control, and communication techniques derived from the experiences of these earlier insurgent groups. The group had extensive support from North Vietnam, and, indirectly, from the Soviet Union. It had parallel political and military structures, often overlapping. See [[Viet Cong and PAVN strategy and tactics]]. [[Image:Vcnvastructure4rev.jpg|thumb|right |A dual, but sometimes overlapping, Party and Military structure was top-down]] The lowest level consisted of three-person cells who operated quite closely, and engaging in the sort of [[self-criticism]] common, as a bonding method, to Communist organizations.{{Citation needed|date=June 2014}} ==Parallel organizations== The NLF and PIRA, as well as other movements, have chosen to have parallel political and military organizations. In the case of the NLF, other than some individuals with sanctuary in North Vietnam, the political organization could not be overt during the [[Vietnam War]]. After the war ended, surviving NLF officials held high office. In the case of the PIRA, its political wing, [[Sinn Féin]], became increasingly overt, and then a full participant in politics. [[Hamas]] and [[Hezbollah]] also have variants of overt political/social service and covert military wings. The overt political/social–covert military split avoided the inflexibility of a completely secret organization. Once an active insurgency began, the secrecy {{clarify span|could limit|date=January 2015}}<!-- what? --> freedom of action, distort information about goals and ideals, and restrict communication within the insurgency.<ref name=FM3-24>{{cite web | title = FM 3-24: Counterinsurgency | author = US Department of the Army |date=December 2006 | url = https://fas.org/irp/doddir/army/fm3-24.pdf |format=PDF}}</ref> In a split organization, the public issues can be addressed overtly, while military actions were kept covert and intelligence functions stay clandestine. ==External support== Many cell systems still receive, with due attention to security, support from the outside. This can range from leaders, trainers and supplies (such as the Jedburgh assistance to the French Resistance), or a safe haven for overt activities (such as the NLF spokesmen in Hanoi). External support need not be overt. Certain Shi'a groups in Iraq, for example, do receive assistance from Iran{{Citation needed|date=March 2009}}, but this is not a public position of the government of Iran, and may even be limited to factions of that government. Early US support to the Afghan Northern Alliance against the Taliban used clandestine operators from both the [[CIA]] and [[United States Army Special Forces]]. As the latter conflict escalated, the US participation became overt. Note that both [[unconventional warfare]] (UW) (guerrilla operations) and [[foreign internal defense]] (FID) (counterinsurgency) may be covert and use cellular organization. In a covert FID mission, only selected host nation (HN) leaders are aware of the foreign support organization. Under [[Operation White Star]], US personnel gave covert FID assistance to the Royal Lao Army starting in 1959, became overt in 1961, and ceased operations in 1962. ==Models of insurgency and associated cell characteristics== While different kinds of insurgency differ in where they place clandestine or covert cells, when certain types of insurgency grow in power, the cell system is deemphasized. Cells still may be used for leadership security, but, if overt violence by organized units becomes significant, cells are less important. In Mao's three-stage doctrine,<ref name=Mao1967>{{cite book | title = On Protracted War | author = Mao, Zedong | authorlink = Mao Zedong | year = 1967 | publisher = Foreign Language Press, Beijing }}</ref> cells are still useful in Phase II to give cover to part-time guerillas, but, as the insurgency creates full-time military units in Phase III, the main units are the focus, not the cells. The [[Eighth Route Army]] did not run on a cell model. When considering where cells exist with respect to the existing government, the type of insurgency needs to be considered. One US Army reference was Field Manual 100-20, which has been superseded by FM3-07.<ref name=FM3-07>{{cite web | title = FM 3-07 (formerly FM 100-20): Stability Operations and Support Operations | date = 20 February 2003 | author = US Department of the Army | url = https://atiam.train.army.mil/soldierPortal/atia/adlsc/view/altfmt/9630-1 | postscript = <!--None--> }}</ref> Drawing on this work, Nyberg (a [[United States Marine Corps]] officer) extended the ideas to describe four types of cell system, although his descriptions also encompass types of insurgencies that the cell system supports.<ref name=Nyberg>{{Cite journal | title = Insurgency: The Unsolved Mystery | first = Eric N. | last = Nyberg | publisher = US Marine Corps University Command and Staff College | year = 1991 | url = http://www.globalsecurity.org/military/library/report/1991/NEN.htm | postscript = <!--None--> }}</ref> At present, there is a new type associated with transnational terrorist insurgencies. # Traditional: the slowest to form, this reflects a principally indigenous insurgency, initially with limited goals. It is more secure than others, as it tends to grow from people with social, cultural or family ties. The insurgents resent a government that has failed to recognize tribal, racial, religious or linguistic groups "who perceive that the government has denied their rights and interests and work to establish or restore them. They seldom seek to overthrow the government or control the whole society; however, they frequently attempt to withdraw from government control through autonomy or semiautonomy." The Mujahideen in Afghanistan and the Kurdish revolt in Iraq illustrate the traditional pattern of insurgency. [[al-Qaeda]] generally operates in this mode, but if they become strong enough in a given area, they may change to the mass-oriented form. # Subversive: Usually driven by an organization that contains at least some of the governing elite, some being sympathizers already in place, and others who penetrate the government. When they use violence, it has a specific purpose, such as coercing voters, intimidating officials, and disrupting and discrediting the government. Typically, there is a political arm (such as [[Sinn Féin]] or the [[Viet Cong|National Liberation Front]]) that directs the military in planning carefully coordinated violence. "Employment of violence is designed to show the system to be incompetent and to provoke the government to an excessively violent response which further undermines its legitimacy." The [[Nazi]] rise to power, in the 1930s, is another example of subversion. Nazi members of parliament and street fighters were hardly clandestine, but the overall plan of the Nazi leadership to gain control of the nation was hidden. "A subversive insurgency is suited to a more permissive political environment which allows the insurgents to use both legal and illegal methods to accomplish their goals. Effective government resistance may convert this to a critical-cell model. # Critical-cell: Critical cell is useful when the political climate becomes less permissive than one that allowed shadow cells. While other cell types try to form intelligence cells within the government, this type sets up "[[Continuity of government|shadow government]]" cells that can seize power once the system is destroyed both by external means and the internal subversion. This model fits the classic [[coup d'etat]],<ref name=Luttwak>{{cite book | title = Coup d'etat: A Practical Handbook | year = 1968 | author = Luttwak, Edward | authorlink = Edward Luttwak | publisher = Harvard University Press }}</ref> and often tries to minimize violence. Variants include the [[Sandinista]] takeover of an existing government weakened by external popular revolution. "Insurgents also seek to infiltrate the government's institutions, but their object is to destroy the system from within." Clandestine cells form inside the government. "The use of violence remains covert until the government is so weakened that the insurgency's superior organization seizes power, supported by the armed force. One variation of this pattern is when the insurgent leadership permits the popular revolution to destroy the existing government, then emerges to direct the formation of a new government. Another variation is seen in the [[Cuba]]n revolution<ref name=Guevara>{{cite book | author = Guevara, Ernesto "Che" | title = On Guerilla Warfare | publisher = Praeger | year = 1961 }}</ref> and is referred to as the foco (or Cuban model) insurgency. This model involves a single, armed cell which emerges in the midst of degenerating government legitimacy and becomes the nucleus around which mass popular support rallies. The insurgents use this support to establish control and erect new institutions." # Mass-oriented: where the subversive and covert-cell systems work from within the government, the mass-oriented builds a government completely outside the existing one, with the intention of replacing it. Such "insurgents patiently construct a base of passive and active political supporters, while simultaneously building a large armed element of guerrilla and regular forces. They plan a protracted campaign of increasing violence to destroy the government and its institutions from the outside. They have a well-developed ideology and carefully determine their objectives. They are highly organized and effectively use propaganda and guerrilla action to mobilize forces for a direct political and military challenge to the government." The revolution that produced the [[Peoples' Republic of China]], the [[American Revolution]], and the [[Shining Path]] insurgency in Peru are examples of the mass-oriented model. Once established, this type of insurgency is extremely difficult to defeat because of its great depth of organization. ==Classic models for cell system operations== Different kinds of cell organizations have been used for different purposes. This section focuses on clandestine cells, as would be used for [[espionage]], [[sabotage]], or the organization for [[unconventional warfare]]. When unconventional warfare starts using overt units, the cell system tends to be used only for sensitive leadership and intelligence roles.<ref name=Mao1967 /> The examples here will use [[CIA cryptonym]]s as a naming convention used to identify members of the cell system. Cryptonyms begin with a two-letter country or subject name (e.g., AL), followed with an arbitrary word. It is considered elegant to have the code merge with the other letters to form a pronounceable word. ===Operations under official cover=== Station BERRY operates, for country B, in target country BE. It has three case officers and several support officers. Espionage operation run by case officers under diplomatic cover, they would have to with the basic recruiting methods described in this article. Case officer BETTY runs the local agents BEN and BEATLE. Case officer BESSIE runs BENSON and BEAGLE. [[Image:Wdip-Cell-0.png|thumb|Representative diplomatic-cover station and networks]] Some recruits, due to the sensitivity of their position or their personalities not being appropriate for cell leadership, might not enter cells but be run as singletons, perhaps by other than the recruiting case officer. Asset BARD is a different sort of highly sensitive singleton, who is a joint asset of the country B, and the country identified by prefix AR. ARNOLD is a case officer from the country AR embassy, who knows only the case officer BERTRAM and the security officer BEST. ARNOLD does not know the station chief of BERRY or any of its other personnel. Other than BELL and BEST, the Station personnel only know BERTRAM as someone authorized to be in the Station, and who is known for his piano playing at embassy parties. He is covered as Cultural Attache, in a country that has very few pianos. Only the personnel involved with BARD know that ARNOLD is other than another friendly diplomat. In contrast, BESSIE and BETTY know one another, and procedures exist for their taking over each other's assets in the event one of the two is disabled. Some recruits, however, would be qualified to recruit their own subcell, as BEATLE has done. BESSIE knows the identity of BEATLE-1 and BEATLE-2, since he had them checked by headquarters counterintelligence before they were recruited. Note that a cryptonym does not imply anything about its designee, such as gender. ===Clandestine presence=== The diagram of "initial team presence" shows that two teams, ALAN and ALICE, have successfully entered an area of operation, the country coded AL, but are only aware of a pool of potential recruits, and have not yet actually recruited anyone. They communicate with one another only through headquarters, so compromise of one team will not affect the other. [[Image:Wnoc-Cell-0.png|thumb|left |Initial team presence by 2 separate clandestine teams with no official cover]] Assume that in team ALAN, ALASTAIR is one of the officers with local contacts, might recruit two cell leaders, ALPINE and ALTITUDE. The other local officer in the team, ALBERT, recruits ALLOVER. When ALPINE recruited two subcell members, they would be referred to as ALPINE-1 and ALPINE-2. ALPINE and ALTITUDE only know how to reach ALASTAIR, but they are aware of at least some of other team members' identity should ALASTAIR be unavailable, and they would accept a message from ALBERT. Most often, the identity (and location) of the radio operator may not be shared. ALPINE and ALTITUDE, however, do not know one another. They do not know any of the members of team ALICE. The legitimacy of the subcell structure came from the recruitment process, originally by the case officer and then by the cell leaders. Sometimes, the cell leader would propose subcell member names to the case officer, so the case officer could have a headquarters name check run before bringing the individual into the subcell. In principle, however, the subcell members would know ALPINE, and sometimes the other members of the ALPINE cell if they needed to work together; if ALPINE-1 and ALPINE-2 had independent assignments, they might not know each other. ALPINE-1 and ALPINE-2 certainly would not know ALASTAIR or anyone in the ALTITUDE or ALLOVER cells. [[Image:Wnoc-Cell-1.png|thumb|Clandestine teams have built initial subcells]] As the networks grow, a subcell leader might create his own cell, so ALPINE-2 might become the leader of the ALIMONY cell. ===Fault-tolerant cellular structures=== Modern communications theory has introduced methods to increase fault tolerance in cell organizations. In the past, if cell members only knew the cell leader, and the leader was neutralized, the cell was cut off from the rest of the organization. Game theory and graph theory have been applied to the study of optimal covert network design (see Lindelauf, R.H.A. et al. 2009. The influence of secrecy on the communication structure of covert networks. Social Networks 31: 126-137). If a traditional cell had independent communications with the foreign support organization, headquarters might be able to arrange its reconnection. Another method is to have impersonal communications "side links" between cells, such as a pair of [[dead drop]]s, one for Team ALAN to leave "lost contact" messages to be retrieved by Team ALICE, and another dead drop for Team ALICE to leave messages for Team ALAN. These links, to be used only on losing contact, do not guarantee a contact. When a team finds a message in its emergency drop, it might do no more than send an alert message to headquarters. Headquarters might determine, through [[SIGINT]] or other sources, that the enemy had captured the leadership and the entire team, and order the other team not to attempt contact. If headquarters can have reasonable confidence that there is a communications failure or partial compromise, it might send a new contact to the survivors. When the cut-off team has electronic communications, such as the Internet, it has a much better chance of eluding surveillance and getting emergency instructions than by using a dead drop that can be under physical surveillance. ==Non-traditional models, exemplified by al-Qaeda== Due to cultural differences, assuming the ''al-Qaeda Training Manual''<ref name=AQTM>{{cite web | url = https://fas.org/irp/world/para/aqmanual.pdf |format=PDF| title = al-Qaeda training manual | publisher = US Southern District Court, US New York City Attorney's Office, entered as evidence in Africa embassy bombings }}</ref> is authentic, eastern cell structures may differ from the Western mode. "Al-Qaida's minimal core group, only accounting for the leadership, can also be viewed topologically as a ring or chain network, with each leader/node heading their own particular hierarchy. "Such networks function by having their sub-networks provide information and other forms of support (the ‘many-to-one’ model), while the core group supplies ‘truth’ and decisions/directions (the ‘one-to-many’ model). Trust and personal relationships are an essential part of the Al-Qaida network (a limiting factor, even while it provides enhanced security). Even while cell members are trained as ‘replaceable’ units, ‘vetting’ of members occurs during the invited training period under the observation of the core group.<ref name=Sleepers>{{cite web | url = http://www.metatempo.com/huntingthesleepers.pdf |format=PDF| title = Hunting the Sleepers: Tracking al-Qaida's Covert Operatives | date = 2001-12-31 | author = Decision Support Systems, Inc. | accessdate = 2007-11-17 }}</ref> Cells of this structure are built outwards, from an internal leadership core. Superficially, this might be likened to a Western cell structure that emanates from a headquarters, but the Western centrality is bureaucratic, while structures in other non-western cultures builds on close personal relationships, often built over years, perhaps involving family or other in-group linkages. Such in-groups are thus extremely hard to infiltrate; infiltration has a serious chance only outside the in-group. Still, it may be possible for an in-group to be compromised through [[COMINT]] or, in rare cases, by compromising a member. The core group is logically a ring, but is superimposed on an inner hub-and-spoke structure of ideological authority. Each member of the core forms another hub and spoke system (see [[#Infrastructure cells|infrastructure cells]]), the spokes leading to infrastructure cells under the supervision of the core group member, and possibly to operational groups which the headquarters support. Note that in this organization, there is a point at which the operational cell becomes autonomous of the core. Members surviving the operation may rejoin at various points. [[Image:T-Cell-0.png|thumb|left |Core group, with contact ring and ideological hierarchy]] Osama, in this model, has the main responsibility of commanding the organization and being the spokesman on propaganda video and audio messages distributed by the propaganda cell. The other members of the core each command one or more infrastructure cells. While the tight coupling enhances security, it can limit flexibility and the ability to scale the organization. This in-group, while sharing tight cultural and ideological values, is not committed to a bureaucratic process. "Members of the core group are under what could be termed 'positive control'—long relationships and similar mindsets make 'control' not so much of an issue, but there are distinct roles, and position (structural, financial, spiritual) determines authority, thus making the core group a hierarchy topologically.<ref name=Sleepers /> In the first example of the core, each member knows how to reach two other members, and also knows the member(s) he considers his ideological superior. Solid lines show basic communication, dotted red arrows show the first level of ideological respect, and dotted blue arrows show a second level of ideological respect. If Osama, the most respected, died, the core would reconstitute itself. While different members have an individual ideological guide, and these are not the same for all members, the core would reconstitute itself with Richard as most respected. Assume there are no losses, and Osama can be reached directly only by members of the core group. Members of outer cells and support systems might know him only as "the Commander", or, as in the actual case of al-Qaeda, Osama bin Laden's face is recognizable worldwide, but only a few people know where he was or even how to contact him. ===Infrastructure cells=== Any clandestine or covert service, especially a non-national one, needs a variety of technical and administrative functions. Some of these services include:<ref name=Sleepers /> # Forged documents and counterfeit currency # Apartments and hiding places # Communication means # Transportation means # Information # Arms and ammunition # Transport Other functions include psychological operations, training, and finance. A national intelligence service<ref name=CIAsupport>{{cite web | url = https://www.cia.gov/offices-of-cia/mission-support/who-we-are.html | author = US Central Intelligence Agency | title = Support to Mission: Who We Are | accessdate = 2007-11-19 }}</ref> has a support organization to deal with services such as finance, logistics, facilities (e.g., [[#Safehouses and Other Meeting Places|safehouses]]), information technology, communications, training, weapons and explosives, medical services, etc. Transportation alone is a huge function, including the need to buy tickets without drawing suspicion, and, where appropriate, using private vehicles. Finance includes the need to transfer money without coming under the suspicion of financial security organizations. Some of these functions, such as finance, are far harder to operate in remote areas, such as the [[FATA]] of [[Pakistan]], than in cities with large numbers of official and unofficial financial institutions, and the communications to support them. If the financial office is distant from the remote headquarters, there is a need for [[couriers]], who must be trusted to some extent, but they may not know the contents of their messages or the actual identity of sender and/or receiver. The couriers, depending on the balance among type and size of message, security, and technology available, may memorize messages, carry audio or video recordings, or hand-carry computer media. [[Image:T-Cell-1.png|thumb|Core group and infrastructure cells; military cells in training]] "These cells are socially embedded (less so than the core group, however), structurally embedded, functionally embedded (they are specialized into a domain), and knowledge base-specific (there does not seem to be a great deal of cross-training, or lateral mobility in the organization). Such cells are probably subjected to a mixture of positive and negative control ("do this, do these sorts of things, don’t do that")."<ref name=Sleepers /> {| class="wikitable" <caption>Core Structure of Non-National Group</caption> |- ! Member ! Infrastructure commanded |- | Richard | Finance |- | Anton | Military training/operations 1 |- | Hassan | Military training/operations 2 |- | David | Transportation |- | Kim | Communications and propaganda |} The leaders of military cells are responsible for training them, and, when an operation is scheduled, selecting the operational commander, giving him the basic objective and arranging whatever support is needed, and then release him from tight control to execute the meeting. Depending on the specific case, the military leaders might have direct, possibly one-way, communications with their cells, or they might have to give Kim the messages to be transmitted, by means that Anton and Hassan have no need to know. Note that Anton does not have a direct connection to Kim. Under normal circumstances, he sacrifices efficiency for security, by passing communications requests through Hassan. The security structure also means that Hassan does not know the members of Anton's cells, and Kim may know only ways to communicate with them but not their identity. Kim operates two systems of cells, one for secure communications and one for propaganda. To send out a propaganda message, Osama must pass it to Kim. If Kim were compromised, the core group might have significant problems with any sort of outside communications. Terrorist networks do not match cleanly to other cell systems that regularly report to a headquarters. The apparent al-Qaeda methodology of letting operational cells decide on their final dates and means of attack exhibit an operational pattern, but not a periodicity that could easily be used for an [[Intelligence analysis management#Indications & warning checklists|indications checklist]] appropriate for a warning center. Such lists depend on seeing a local pattern to give a specific warning.<ref name=Vos>{{cite web | title = Modeling Terrorist Networks - Complex Systems at the Mid-Range | first1 = Philip Vos | last1 = Fellman | first2 = Roxana | last2 = Wright | url = http://www.psych.lse.ac.uk/complexity/Conference/FellmanWright.pdf |format=PDF| accessdate = 2007-11-02 }}</ref> Note that Hassan has two subordinates that have not yet established operational cells. These subordinates can be considered '''sleepers''', but not necessarily with a sleeper cell. ===Operational cells=== For each mission are created one or more operational cells. If the al-Qaeda signature of multiple concurrent attacks is used, there may be an operational cell for each target location. It will depend on the operation if they will need any support cells in the operational area. For example, it may be more secure to have a local cell build bombs, which will be delivered by cells coming from outside the area. "Operational cells are not created, but instead 'seeded' utilizing individuals spotted or that request assistance (both groups are 'vetted' by being trained under the observation of the core group, which dramatically restricts the opportunity for passing off walk-ins under false flag). Categorization of operational cells appears to be by capabilities, region, and then task/operation. Operational cells are composed of members whose worldview has been firmly tested—necessary to front-load, because such cells are dispersed back to their own local control (or negative control—proscribed behavior—with positive control only coming in the form of contact for synchronization or support)."<ref name=Sleepers /> If operational cells routinely are "released" ''curved dotted lines on link to military cells'' to select their final operational parameters, they use a different paradigm than governmental clandestine or covert operations. On a number of cases, US special operations forces had to wait for Presidential authorization to make an attack, or even move to staging areas. Admittedly, a country would have to face the consequences of an inappropriate attack, so it may tend to be overcautious, where a terror network would merely shrug at the world being upset. Assuming that the al-Qaeda operational technique is not to use positive control, their operations may be more random, but also more unpredictable for counterterror forces. If their cells truly need constant control, there are communications links that might be detected by SIGINT, and if their command can be disrupted, the field units could not function. Since there is fairly little downside for terrorists to attack out of synchronization with other activities, the lack of positive control becomes a strength of their approach to cell organization. [[Image:T-Cell-2.png|thumb|left |Core group, with contact ring and ideological hierarchy]] The operational cells need to have continuous internal communication; there is a commander, who may be in touch with infrastructure cells or, less likely from a security standpoint with the core group. Al-Qaeda's approach, which even differs from that of earlier terrorist organizations, may be very viable for their goals: * Cells are redundant and distributed, making them difficult to ‘roll up’ * Cells are coordinated, not under "command & control"—this autonomy and local control makes them flexible, and enhances security * Trust and comcon internally to the cell provide redundancy of potential command (a failure of Palestinian operations in the past), and well as a shared knowledgebase (which may mean, over time, that ‘cross training’ emerges inside a cell, providing redundancy of most critical skills and knowledge).<ref name=Sleepers /> ===Indirect support networks=== In the above graphic, note the indirect support network controlled by Richard's subcell. "While Al-Qaida has elements of the organization designed to support the structure, but such elements are insufficient in meeting the needs of such an organization, and for security reasons there would be redundant and secondary-/tertiary-networks that are unaware of their connection to Al-Qaida. These networks, primarily related to fundraising and financial activities, as well as technology providers, are in a ‘use’ relationship with Al-Qaida—managed through cut-outs or individuals that do not inform them of the nature of activities, and that may have a cover pretext sufficient to deflect questions or inquiry."<ref name=Sleepers /> ===A possible countermeasure=== In 2002, ''U.S. News & World Report'' said that American intelligence is beginning to acquire a sufficiently critical mass of intelligence on al-Qaida indicating, "Once thought nearly impossible to penetrate, al Qaeda is proving no tougher a target than the KGB or the Mafia--closed societies that took the U.S. government years to get inside. "We're getting names, the different camps they trained at, the hierarchy, the infighting," says an intelligence official. "It's very promising."<ref name=Kaplan2002>{{Cite journal | title = Run and Gun: Al Qaeda arrests and intelligence hauls bring new energy to the war on terrorism | first = David E. | last = Kaplan | date = 22 September 2002 | journal = U.S. News & World Report | url = http://www.usnews.com/usnews/news/articles/020930/archive_022824.htm | postscript = <!--None--> }}</ref> The report also said that the collected data has allowed the recruiting of informants. Writing in the U.S. Army journal ''Military Review'', David W. Pendall suggested that a "catch-and-release program for suspected operatives might create reluctance or distrust in such suspects and prevent them from further acts or, perhaps more important, create distrust in the cell leaders of these individuals in the future." The author noted the press release describing Ramzi Binalshib's cooperation with the United States "are sure to prevent reentry into a terrorist cell as a trusted member and most likely limits the further trust and assignments of close cell associates still at large. The captor would determine when to name names and when to remain silent."<ref name=Pendall2004>{{Cite journal | date = January–February 2004 | journal = Military Review | url = http://calldp.leavenworth.army.mil | first = David W. | last = Pendall | title =Effects-Based Operations and the Exercise of National Power | publisher = [[United States Army Combined Arms Center]] | postscript = <!--None--> }} Find the article by going through the Military Review directories</ref> Indeed, once intelligence learns the name and characteristics of an at-large adversary, as well as some sensitive information that would plausibly be known to him, a news release could be issued to talk about his cooperation. Such a method could not be used too often, but, used carefully, could disturb the critical trust networks. The greatest uncertainty might be associated with throwing doubt onto a key member of an operational cell that has gone autonomous. ==See also== * [[Leaderless resistance]] * [[Lone wolf (terrorism)]] ==References== {{reflist | 2}} ==External links== * [http://theriskyshift.com/2012/06/an-introduction-to-terrorist-organisational-structures/ An Introduction To Terrorist Organisational Structures] {{Intelligence cycle management}} [[Category:Counter-intelligence]] [[Category:Types of espionage]] [[Category:Intelligence analysis]] [[Category:Military intelligence]] [[Category:Military tactics]] [[Category:Secrecy]] [[Category:Terrorism tactics]] [http://www.cimacell.com/wiki/index.php?title=Structure Reachback Ops] fb5a1d844ca4bdb97864146cb93843feaf88a994 File:Vcnvastructure4rev.jpg 6 53 90 2015-12-27T01:38:58Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 :Reachback Ops 3000 54 94 2015-12-27T22:45:02Z Eddie 1 Created page with "<presentation name='Reachback Operations=","> Agenda, Upcoming Events, New Hires </presentation>" wikitext text/x-wiki <presentation name='Reachback Operations=","> Agenda, Upcoming Events, New Hires </presentation> 0ca54fd60e03bed1fafdcd57978676b867ba5c78 95 94 2015-12-27T22:45:54Z Eddie 1 wikitext text/x-wiki <presentation name='Reachback Operations' delimiter=","> Agenda, Upcoming Events, New Hires </presentation> ef425e633873cdef061e680c4b83178e4ed5ff38 96 95 2015-12-27T22:47:32Z Eddie 1 wikitext text/x-wiki <presentation name='Reachback Operations' delimiter=","> Support, Capabilities, Cell System </presentation> a3794fef2b6d4353ec88713e04184fbe2e51fd8a 98 96 2015-12-27T23:52:50Z Eddie 1 wikitext text/x-wiki <presentation name='Reachback Operations' delimiter=","> Overview, Support, Capabilities, Cell System </presentation> b8132b1b73058cae2f0c31146e148d2604698dbf 100 98 2015-12-27T23:59:00Z Eddie 1 Eddie moved page [[Presenation:Reachback Ops]] to [[Presentation:Reachback Ops]] without leaving a redirect wikitext text/x-wiki <presentation name='Reachback Operations' delimiter=","> Overview, Support, Capabilities, Cell System </presentation> b8132b1b73058cae2f0c31146e148d2604698dbf Category:Indexed pages 14 55 97 2015-12-27T23:47:34Z Eddie 1 Created page with "This is the Indexed pages category." wikitext text/x-wiki This is the Indexed pages category. 15140b1cf0bf79e3f29c609d0d942a884787dff9 :Overview 3000 56 99 2015-12-27T23:58:00Z Eddie 1 Created page with "Reachback" wikitext text/x-wiki Reachback 61532ea93d3e312ab301bf6345cf33cdede31212 101 99 2015-12-28T00:00:55Z Eddie 1 Eddie moved page [[Overview]] to [[Presentation:Overview]] without leaving a redirect wikitext text/x-wiki Reachback 61532ea93d3e312ab301bf6345cf33cdede31212 Reachback Operations 0 43 102 92 2015-12-28T10:05:35Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Situation Center</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Situation Reports and Briefings]]</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning and Alerts]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 7404fe888d6f77254ca11f42695078066d623990 103 102 2015-12-28T10:07:26Z Eddie 1 /* Areas of Interest */ wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Situation Center</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 72fef339715c5a525f667c24831c34c0b2d6f827 104 103 2015-12-28T10:09:30Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Joint Operations</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 13d45658ebf78e77d3e1c0d470ab5db75720f183 105 104 2015-12-28T10:15:21Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 723cdf520a302bca481a2edc00046b8a70bd3344 106 105 2015-12-28T10:17:19Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Assurance Support Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 83294f168b832399f1d7df0b7136784308b70d44 107 106 2015-12-28T10:22:37Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">[[Early Warning Alert System]]</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 05d56ca0e790504d589ae2f1e469eb95abc645cc 108 107 2015-12-28T10:25:34Z Eddie 1 /* Areas of Interest */ wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 3a2453a968fb571ef4e0e9b911e0bfe88adbc5a4 109 108 2015-12-28T10:27:59Z Eddie 1 /* Areas of Interest */ wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} b84ab4e910bc3e84b2073a71d7cce05633f8b5f7 110 109 2015-12-28T11:05:30Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 830f21a1d1b577f54cb4f6ecd6ca5bf8829bd188 111 110 2015-12-28T11:13:24Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Capabilities </h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} c95e4f7ad82d6c5f245c2dee2b000c739900586f 112 111 2015-12-28T11:15:08Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Capabilities </h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Plans and Policy = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 7b80b66cf8f482dc76dafb5a06c288b1c856b368 113 112 2015-12-28T11:16:46Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Capabilities </h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Policy and Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 790668b98498751e914ca0a4b25fe78afa27e4b3 114 113 2015-12-28T11:18:03Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Architectural Framework</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Policy and Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 7459cbdbe779a0a9f6a9fe13e8019f59edf7a220 115 114 2015-12-28T14:01:46Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Operational and Mission Support</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Policy and Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 3032128644768cb4dee9e8280f83b3ec402cc2ba 116 115 2015-12-28T14:03:39Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Operations and Mission Assurance</div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Policy and Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 21a705f882b4f7de5b7780fe193b69911c854ff4 117 116 2015-12-28T14:08:12Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Innovative Servicea </div> |} |} = Areas of Interest = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Support = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Electronic Library = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Policy and Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 51575bf095cf361bfea74d019039bc5a1495367b 118 117 2015-12-28T17:49:19Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Innovative Servicea </div> |} |} = Publications = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Documention Templates = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Support Capability = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} fb3e0589f1d0a979638500f40002d2b509c20781 125 118 2015-12-29T03:12:48Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Publications = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Reachback Capability</h2> |} = Structuring = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Mission Assurance</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Operational Support</h2> |} {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;">Discrete Activites</h2> |} = Documention Templates = {| style="width:100%; vertical-align:top; background:#f5fffa;" |- | style="padding:2px" | <h2 style="margin:3px; background:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Support Capability = {| style="width:100%; vertical-align:top; backgrounf:#f5fffa;" |- |- | style="padding:2px" | <h2 style="margin:3px; backgroung:#eff4f2; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em;"> </h2> |} = Knowledge Base = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} e643e378c3a1733876aa7c2cff4f487a858695c0 Template:Item 10 57 119 2015-12-29T01:04:11Z Eddie 1 Created page with "<noinclude> This is the "Item" template. It should be called in the following format: <pre> {{Item |Name= }} </pre> Edit the page to see the template text. </noinclude><includ..." wikitext text/x-wiki <noinclude> This is the "Item" template. It should be called in the following format: <pre> {{Item |Name= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Name | [[Name::{{{Name|}}}]] |} </includeonly> 17015c8d2583cbb496a466682e1e6c7b26a45b24 120 119 2015-12-29T01:04:27Z Eddie 1 wikitext text/x-wiki <includeonly> =Citation= {{#ask:[[{{FULLPAGENAME}}]] |?Citation |mainlabel=- |headers=hide |class=citationtable }} {| class="wikitable itemtable" style="width:100%;" ! Abstract | {{#if:{{{abstract|}}}|{{{abstract}}}|&nbsp;}} |- ! Keywords | {{#invoke:Utilities|parseMultiple|{{lc:{{{keywords|}}}}}|Keyword Link}} |- {{#if: {{{journal|}}}{{{year|}}}{{{publisher|}}}||<div style="display:none">}} {{Optional Table Row|Journal|{{{journal|}}}}} {{Optional Table Row|Year|{{{year|}}}}} {{Optional Table Row|Publisher|{{{publisher|}}}}} |} {{#if: {{{journal|}}}{{{year|}}}{{{publisher|}}}||</div>}} =Reviews= <div style="text-align:right;width:100%"> {{#if:{{CURRENTUSER}}|{{#formlink:form=Review|target=Review:{{PAGENAME}}/{{CURRENTUSER}}|link text={{#if:{{#ask:[[Review:{{PAGENAME}}/{{CURRENTUSER}}]]}}|Edit Your Review|Review This Item}}|link type=post button}}}} </div> <div style="display:none;"> {{#vardefine:fivestar|{{#show:{{FULLPAGENAME}}|?Five Star Review Count}}|0}} {{#vardefine:fourstar|{{#show:{{FULLPAGENAME}}|?Four Star Review Count}}|0}} {{#vardefine:threestar|{{#show:{{FULLPAGENAME}}|?Three Star Review Count}}|0}} {{#vardefine:twostar|{{#show:{{FULLPAGENAME}}|?Two Star Review Count}}|0}} {{#vardefine:onestar|{{#show:{{FULLPAGENAME}}|?One Star Review Count}}|0}} {{#vardefine:max1|{{#ifexpr:{{#var:fivestar}}>{{#var:fourstar}}|{{#var:fivestar}}|{{#var:fourstar}}}}}} {{#vardefine:max2|{{#ifexpr:{{#var:threestar}}>{{#var:twostar}}|{{#var:threestar}}|{{#var:twostar}}}}}} {{#vardefine:max3|{{#ifexpr:{{#var:max1}}>{{#var:max2}}|{{#var:max1}}|{{#var:max2}}}}}} {{#vardefine:max4|{{#ifexpr:{{#var:onestar}}>1|{{#var:onestar}}|1}}}} {{#vardefine:max|{{#ifexpr:{{#var:max3}}>{{#var:max4}}|{{#var:max3}}|{{#var:max4}}}}}} </div>{{Bar chart | bar_width = 15 | data_max = {{#var:max}} | label1 = {{Review Item Query|5 stars|5}} | data1 = {{#var:fivestar}} | label2 = {{Review Item Query|4 stars|4}} | data2 = {{#var:fourstar}} | label3 = {{Review Item Query|3 stars|3}} | data3 = {{#var:threestar}} | label4 = {{Review Item Query|2 stars|2}} | data4 = {{#var:twostar}} | label5 = {{Review Item Query|1 star|1}} | data5 = {{#var:onestar}} }} {{#if:{{#urlget:rating}}|{{#vardefine:rating|[[Rating::{{#urlget:rating}}]]}} {{Review Item Query|see all reviews}} <b>{{#urlget:rating}} Star Reviews:</b> |{{#vardefine:rating| }}}} {{#ask:[[Category:Reviews]][[Item::Item:{{PAGENAME}}]]{{#var:rating}} |?Rating |?Reviewer |?Comments |sort=Rating |order=desc |format=template |template=Review Link Item |default=no reviews }} <div style="display:none;"> {{DEFAULTSORT:{{{title|}}}}} {{#set:Full_Title={{{title|}}}}} {{#set:Short_Title={{#sub:{{{title|}}}|0|40}}...}} {{#set:Sorting Title={{lc:{{{title|}}}}}}} {{#arraymap:{{{keywords|}}}|,|@@@@|{{#set:Keyword={{lc:@@@@}}}}}} {{#set:Keyword Links={{#invoke:Utilities|parseMultiple|{{lc:{{{keywords|}}}}}|Keyword Link}}}} {{#set:Year={{{year}}}}} {{#set:Item Type={{{type}}}}} {{#set:Journal={{{journal|}}}]] {{#set:Publisher={{{publisher|}}}}} {{#set:Abstract={{{abstract|}}}}} {{#set:Average Rating Stars={{#invoke:Utilities|unstrip|{{#rating:{{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]]|?Rating|format=average}}}}}}}} {{#if: {{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]]|?Rating}} | {{#switch: {{#ask: [[Category:Reviews]][[Item::{{FULLPAGENAME}}]]|?Rating|format=average}} | 1 = {{#set:Average Rating=&#9734;}}{{#set:Average Rating Number=1}} | 2 = {{#set:Average Rating=&#9734; &#9734;}} {{#set:Average Rating Number=2}} | 3 = {{#set:Average Rating=&#9734; &#9734; &#9734;}} {{#set:Average Rating Number=3}} | 4 = {{#set:Average Rating=&#9734; &#9734; &#9734; &#9734;}} {{#set:Average Rating Number=4}} | 5 = {{#set:Average Rating=&#9734; &#9734; &#9734; &#9734; &#9734;}} {{#set:Average Rating Number=5}} | default = {{#set:Average Rating=not rated}} {{#set:Average Rating Number=0}} }} | {{#set:Average Rating=not rated}}{{#set:Average Rating Number=0}}}} {{#ratingAfterTitle:{{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]]|?Rating|format=average}}}} {{#set:Five Star Review Count={{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]][[Rating::5]]|format=count|default=0}}}} {{#set:Four Star Review Count={{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]][[Rating::4]]|format=count|default=0}}}} {{#set:Three Star Review Count={{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]][[Rating::3]]|format=count|default=0}}}} {{#set:Two Star Review Count={{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]][[Rating::2]]|format=count|default=0}}}} {{#set:One Star Review Count={{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]][[Rating::1]]|format=count|default=0}}}} {{#set:Item Type Image=<div style="text-align:center;">[[Image:{{{type}}}.png|link=|48px|{{{type}}}]]<br /><span style="font-size:xx-small;">{{{type}}}</span></div>}} {{#set:Citation= '''[[{{FULLPAGENAME}}|{{{title|}}}]]''' by {{{authors|}}} {{#if: {{{year|}}} | {{{year|}}} | }} | }} <br/> }} {{#set:Title Icon={{{type}}}.png}} {{#set:Responsive Citation=<div class="row"><div class="large-1 column">[[Image:{{{type}}}.png|24px|link=]]</div><div class="large-2 column">{{#invoke:Utilities|unstrip|{{#rating:{{#ask:[[Category:Reviews]][[Item::{{FULLPAGENAME}}]]|?Rating|format=average}}}}}}</div><div class="large-9 columns">'''[[{{FULLPAGENAME}}|{{{title|}}}]]'''{{#if: {{{year|}}} | , {{{year|}}} | }}</div></div>}} [[Category:Items]] <headertabs><headertabs/> </div> {{#var:stars}} </includeonly><noinclude>[[Category:Framework Pages]]</noinclude> 4e25a7df5eae1cff1a1d9ba3833711b04fa55296 Form:Item 106 58 121 2015-12-29T01:05:57Z Eddie 1 Created page with "<noinclude> This is the "Item" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit th..." wikitext text/x-wiki <noinclude> This is the "Item" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Item}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Item}}} {| class="formtable" ! Type: | {{{field|type}}} |- ! Abstract: | {{{field|abstract}}} |- ! Keywords: | {{{field|keywords}}} |- ! Journal: | {{{field|journal}}} |- ! Year: | {{{field|year}}} |- ! Publisher: | {{{field|publisher}}} |- ! Title: | {{{field|title}}} |- ! Authors: | {{{field|authors}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> ac2f6106f79cbd7b986303a4022acd39545ef479 122 121 2015-12-29T01:06:41Z Eddie 1 wikitext text/x-wiki <includeonly> {{{info|page name=Item:<unique number;start=1>|create title=Add Item}}} {{{for template|Item}}} {|class="formtable" style="border: none;" | {{{standard input|save|label=Save}}} {{{standard input|cancel}}} |- | style="vertical-align:top;" | '''Citation Title''' | style="vertical-align:top;" | {{{field|title|input type=textarea|cols=80|rows=2|mandatory}}} |- | style="vertical-align:top;" |'''Year''' | style="vertical-align:top;" | {{{field|year|input type=textarea|cols=5|rows|1|mandatory}}} |- | style="vertical-align:top;" | '''Journal''' | {{{field|journal|input type=text|size=80}}} |- | style="vertical-align:top;" |'''Publisher''' | {{{field|publisher|input type=textarea|rows=1|cols=50}}} |- | style="vertical-align:top;" | '''Authors (FN MI LN)''' | style="vertical-align:top;" | {{{field|authors|holds template}}} |- | style="vertical-align:top;" | '''Keywords''' | {{{field|keywords|input type=tokens}}} |- | style="vertical-align:top;" | '''Media Type''' | {{{field|type|input type=listbox|default=article|mandatory|size=10}}} |- | style="vertical-align:top;" | '''Abstract''' | {{{field|abstract|input type=textarea|editor=wikieditor}}} |- | {{{standard input|save|label=Save}}} {{{standard input|cancel}}} |} {{{end template}}} {{{for template|Author|embed in field=Item[authors]|multiple|add button text=Add an Author}}} {{{field|author|input type=text|size=40}}} {{{end template}}} </includeonly> <noinclude> [[Category:Framework Pages]] </noinclude> 65826065ad5b4aea274e3338f34faea5bef474fd Property:Item Type 102 59 123 2015-12-29T01:14:10Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 124 123 2015-12-29T01:14:27Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] [[Allows value::article]] [[Allows value::book]] [[Allows value::booklet]] [[Allows value::conference]] [[Allows value::inbook]] [[Allows value::incollection]] [[Allows value::inproceedings]] [[Allows value::manual]] [[Allows value::mastersthesis]] [[Allows value::misc]] [[Allows value::phdthesis]] [[Allows value::proceedings]] [[Allows value::standard]] [[Allows value::techreport]] [[Allows value::unpublished]] abcd7257bbc4f8f15fdc7663c0b0f654f7b111a9 Cyber Early Warning 0 60 126 2015-12-29T03:46:53Z Eddie 1 Created page with "== Overview ==" wikitext text/x-wiki == Overview == d27702e19830e4761cc4d2ae69628ba03faca2d0 127 126 2015-12-29T11:31:05Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment in context of an evolved state maturity and an advanced Cyber capable operation summarized in describing the following: == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. 514b05c392469d0e2c8ccd64b4cf32f027f81103 129 127 2015-12-29T11:37:36Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|thumbnail]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. 3cafa3fc2bb7ff006e1d02e7ca508693fc922f54 130 129 2015-12-29T11:38:40Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|340px|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. 244d5cc33af15d730d440c90b35ecfd60331c3a7 131 130 2015-12-29T11:39:18Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. 14cb49ff1607ee8b1b39f297a1d5eaf3220b40d5 135 131 2015-12-29T11:45:27Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Cyber Early Warning Systems}} 44a22543e2964f8ab2334ad15e426025fdab68ae 136 135 2015-12-29T11:46:00Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Cyber Early Warning}} 7dd9915524621729b8093e4e9ee12414acf81c45 139 136 2015-12-29T11:50:16Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Early Warning Systems}} b2fe876f76aab63a5bf0d8f1f892baa5cfec08be 142 139 2015-12-29T11:54:43Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Early Warning Systems}} {{TRADECRAFT}} 41e0b65583272bc368b36ebe61d8e4140721306d 143 142 2015-12-29T11:56:35Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{EARLY WARNING SYSTEMS}} {{THE TRADECRAFT}} a07bfcccde49670657b26a3a16c739012d9255ea File:Warning-intelligence-image.png 6 61 128 2015-12-29T11:35:16Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Template:New Paragraph 10 62 132 2015-12-29T11:41:26Z Eddie 1 Created page with "<includeonly> <div class="np"></div> </includeonly><noinclude>[[Category:Framework Pages]]</noinclude>" wikitext text/x-wiki <includeonly> <div class="np"></div> </includeonly><noinclude>[[Category:Framework Pages]]</noinclude> 4de0b1b5b72807dfd76e4dafde6bab88c4430c85 Template:Early Warning System Types 10 63 133 2015-12-29T11:42:34Z Eddie 1 Created page with "<noinclude> This is the "Early Warning System Types" template. It should be called in the following format: <pre> {{Early Warning System Types }} </pre> Edit the page to see t..." wikitext text/x-wiki <noinclude> This is the "Early Warning System Types" template. It should be called in the following format: <pre> {{Early Warning System Types }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 7e5f15413a7cebf69688705ba3504e1ecbb440ef 134 133 2015-12-29T11:44:34Z Eddie 1 wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based ''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based ''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. � 51896e1e2fefa024a93261d92c68cd6d0756ef7a Template:Early Warning Systems 10 64 137 2015-12-29T11:47:40Z Eddie 1 Created page with "== EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document..." wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. Activity and actor based {{No Paragraph}} Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. � 856075414551b34604556d592f18f6f4b33ffd72 138 137 2015-12-29T11:48:25Z Eddie 1 Eddie moved page [[Template:Cyber Early Warning]] to [[Template:Early Warning Systems]] without leaving a redirect wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. Activity and actor based {{No Paragraph}} Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. � 856075414551b34604556d592f18f6f4b33ffd72 140 138 2015-12-29T11:52:41Z Eddie 1 /* EARLY WARNING SYSTEMS */ wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. {{No Paragraph}} '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. 76f9ecc01e29144cced1b3664aa4f34a6fb0041e 141 140 2015-12-29T11:53:25Z Eddie 1 /* EARLY WARNING SYSTEMS */ wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. {{New Paragraph}} '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. b8c6bf951ccfecd23a57e361853a0ce0629178c7 Cyber Early Warning 0 60 144 143 2015-12-29T11:57:52Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Early Warning System Types}} {{THE TRADECRAFT}} bf9d251a5ba12fa394aef871862d74613c76be2b 148 144 2015-12-29T12:04:35Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{Early Warning Systems|EARLY WARNING SYSTEMS}}} {{THE TRADECRAFT|THE TRADECRAFT}} a033970a7eba2239c444ea64e1f4947fecc92256 149 148 2015-12-29T12:05:46Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. == {{Early Warning Systems|EARLY WARNING SYSTEMS}}} == == {{THE TRADECRAFT|THE TRADECRAFT}} == 5496331727db4c98ec8620fa150aa056cfe1c62b 150 149 2015-12-29T12:06:23Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. == {{Early Warning Systems|EARLY WARNING SYSTEMS}}} == {{THE TRADECRAFT|THE TRADECRAFT}} de7290618166bca37cd0c4bc9d8df58dc86b092f 151 150 2015-12-29T12:07:00Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. == {{Early Warning Systems|EARLY WARNING SYSTEMS}}} == == {{THE TRADECRAFT|THE TRADECRAFT}} == c4a2939d9ad721c2e7bfda3fc704a5534adfd316 152 151 2015-12-29T12:09:42Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} == {{Early Warning Systems|EARLY WARNING SYSTEMS}}} == == {{THE TRADECRAFT|THE TRADECRAFT}} == 10501970ea021c679d48cfa407c96fd56385cf02 153 152 2015-12-29T12:10:50Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} {{Early Warning Systems|EARLY WARNING SYSTEMS}}} {{New Paragraph}} {{THE TRADECRAFT|THE TRADECRAFT}} b74369af2ee8ebe69ed5b98e8e896cc5a36e99d9 154 153 2015-12-29T12:11:37Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} {{Early Warning Systems}}} {{New Paragraph}} {{THE TRADECRAFT}} bf34e47181d1fd8759f12dcd84767e4dfc597e88 155 154 2015-12-29T12:12:40Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} =={{Early Warning Systems}} == {{New Paragraph}} == {{THE TRADECRAFT}} acb3c44d3046d6532957734804b194166d921b34 156 155 2015-12-29T12:14:23Z Eddie 1 /* {{Early Warning Systems}} */ wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} {{Early Warning Systems}} {{New Paragraph}} == {{THE TRADECRAFT}} 21151193a44a8c41412ebf81c86b463f83f81f01 157 156 2015-12-29T12:14:47Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} {{Early Warning Systems}} {{New Paragraph}} {{THE TRADECRAFT}} 573486d4a3740bd69283ea162a98e575ea59f12a 158 157 2015-12-29T12:18:58Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == KEY ELEMENTS == Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. 2b684546789b68431262556374e04ac1d6cc4a8c 159 158 2015-12-29T12:23:52Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. dd23854ceecbe1fa900866fa5b7e86838632bf3c 160 159 2015-12-29T12:24:56Z Eddie 1 wikitext text/x-wiki ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. a0baaba08daa4bcbef845d39f7d9d8e5d3b490a0 161 160 2015-12-29T12:25:28Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|link=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. d0f94a532e1c63aa11856fba9e01f962e323045e 162 161 2015-12-29T12:26:58Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == [[File:Warning-intelligence-image.png|Thumbnail|rightlink=]] As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. b1495d3dfa648602170bf971dffccade37bfc3b2 163 162 2015-12-29T12:27:38Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ ==SUMMARY == [[File:Warning-intelligence-image.png|Thumbnail|rightlink=]] Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. 356c08d224339577c7f437404bf6d91d7276028b 164 163 2015-12-29T12:28:18Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. aef6ac87c85b5b7d6890ac71eca11a9ba55f4655 165 164 2015-12-29T12:28:49Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. 8822fabc4a54da6763bdf756c184cdcf9c5ef6d8 166 165 2015-12-29T12:31:24Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Compatible with::NATO]] 710781851af1a72b7fb7199f589812548d83bc1f 167 166 2015-12-29T12:32:01Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO]] 360ac192e058b1c99f949e8487c6a6a94b1f8470 168 167 2015-12-29T12:34:29Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-warning.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO]] f614bb606332b335171b8491b730c258e59ca6aa 169 168 2015-12-29T12:37:09Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO]] 7e2f0504f5f73b6f39b6ca528befe2c63958b5fb 170 169 2015-12-29T12:39:13Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragra}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO]] 3664de1d6d46263225e2f885547281f79d905baa 174 170 2015-12-29T12:43:02Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO]] 2dff9e9504fc0e3c7db64b7fc1d92a644c3938af 176 174 2015-12-29T12:45:02Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO| ]] 3ba1dae9a8043156bb4334d8a9d928b746eab28f 177 176 2015-12-29T12:53:17Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == STRUCTURE An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO| ]] 16b08d80136773a380389bd8b9dea40e2c48235f 179 177 2015-12-29T12:57:57Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] [[Aligns with::NATO| ]] 653e51946183c7f5514167651f68b11798697c78 180 179 2015-12-29T12:58:42Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] cb43caf719d8239d780955544e02c387a97c9f9c 182 180 2015-12-29T13:05:50Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. == THE TRADECRAFT == '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects-advr.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] da471593567934723d3c16482ee0f6a76563482b 184 182 2015-12-29T13:09:54Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__ [[File:Warning-intelligence-image.png|rightlink=]] ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. = TRADECRAFT = '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects-advr.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] e79c6e963b5f3f416a334b59efd3aba5ae10e263 185 184 2015-12-29T13:10:53Z Eddie 1 wikitext text/x-wiki [[File:Warning-intelligence-image.png|rightlink=]] __NOEDITSECTION__ ==SUMMARY == Distinguishing the differences between Early Warning Systems (EWS) can be broadly described by those intended focus of Warning in order to Alert to prepare, the other focus of Alert in order to Warn to prevent. This difference provides very different characteristics fundamental in the approaches and engineering required with an understanding in both. The following descriptions attempt to further illustrate differences between the effects resulting from an event and effects from an action in their objectives. == PURPOSE == To further help communication this purpose the most effective method is illustrating within the conceptual model of the organization’s environment. == INDUSTRY STATE OF PRACTICE == As part of the overall enterprise strategy the organization’s implementation of a comprehensive “Cyber” program provide the foundation and program pillars. To achieve this requires addressing some of the most complex issues organizations are facing. Many of which lack the understanding that their capabilities over the next several years built on the foundations being put in place today. {{New Paragraph}} An example is the information security industry’s “threat intelligence” and movement to an intelligence lead approach to security. There are fundamental problems with this organizations must consider. While the idea and concept of this is certainly a major step in the right direction, an intelligence lead approach to security being lead by professionals in the intelligence field is an absolute necessity (the security industry taking the intelligence lead is an approach critically crippled) == UNDERSTANDING EARLY WARNING == One of the most well known examples of early warning is the Distant Early Warning (DEW) Line set up by the United States and Canada during the early days of the Cold War. But detecting an inbound attack is only a small part of early warning, a fact much overlooked in the cyber field, rooted in a mistaken belief that cyber incidents happen so quickly that “early” has to be measured in milliseconds. Accordingly, much of what passes for cyber early warning is actually tactical warning and attack assessment (TW/AA) to detect attacks immediately and determine how serious they may be. {{New Paragraph}} However, any warnings provided through TW/AA—whether for nuclear forces or cyber attacks—are not very early, providing only hours to minutes for decision makers to react. Since the real goal for early warning is to detect attacks in time to put sufficient countermeasures in place beforehand to stop the attack or minimize its effects, the short timelines of TW/AA generally are not enough on its own. Accordingly, providing earlier, strategic warning of attacks —weeks or even months ahead, an intelligence task, a key element of which determine if the geopolitical or socio-cultural situation becoming so tense an adversary would be willing to launch an attack. Cyber warning is no different: to have the maximum time to respond, defenders must not only be able to detect inbound attacks but also look for the intent of adversaries before they actually decide to turn the launch key (or press the enter key). {{New Paragraph}} Unfortunately, because of the technical nature of the domain and its practitioners, “early warning for cyber attacks” often is equated to only computer networking products monitoring for hostile zeroes and ones inbound on the wire. This kind of cyber warning is plagued by multiple problems, each difficult and together sometimes insurmountable, such as issues detecting malicious attacks in massive flows of Internet traffic and determining if different attacks are part of the same campaign, especially when multiple organizations have been targeted. {{New Paragraph}} == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated {{New Paragraph}} Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. = TRADECRAFT = '''Strategic Cyber Early Warning - An Adaptive Approach''' * '''KEY ELEMENTS''' Risk Knowledge Monitoring and Warning Services Dissemination and Communication Threat Operation (analysis and countermeasures) Contingency (crisis management) Response (rapid response of incident event) {{New Paragraph}} KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts. {{New Paragraph}} Accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. == Structure == An emphasis on cyber resilience and decreasing the emphasis on cyber defense will focus on the effects against an adversarial attempts in attacking. Below are some examples of tactic characteristics and the effects they may have. This differs greatly from the typical approaches in cyber defense and attempting to stop an attacker through network and system controls. {{New Paragraph}} It is safe to assume an increasing rapid exposure by the private sector to military and government will result in a drastic changing of networks and systems. Most corporate professionals lack exposure in the cyber maneuvering or experience in security in depth and breadth including network address changing rapidly proven to hinder attackers from the inability in the existing tools. When considering an infrastructure modernization, expect to see an increasing movement towards rapid dynamic networks from the changing addresses and nodes within dynamically created, joining, splitting and removing that allows better allocation of resources but more important poses an extremely increased level of difficulty from an attacker’s view. Regardless if these are ever implemented with the organization below are examples of characterizing the effects to an adversaries that will help provide the organization an unmatched capability in the threat operations area and the capability componentization for guiding future capability introduction. [[File:Effects-advr.png|link= ]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Early-Warning-image.jpg}} {{DISPLAYTITLE: Reachback Cell}} [[Developed by::OSEC| ]] 0bf402a37d6608dc930842c1f11669a13d8def1a Template:THE TRADECRAFT 10 65 145 2015-12-29T11:59:48Z Eddie 1 Created page with "THE TRADECRAFT Indicator Lists: Compiling Indications... Fundamentals of Indications Analysis….. Specifics of the Analytical Method . . . . . Strategic Cyber Early Warning -..." wikitext text/x-wiki THE TRADECRAFT Indicator Lists: Compiling Indications... Fundamentals of Indications Analysis….. Specifics of the Analytical Method . . . . . Strategic Cyber Early Warning - An Adaptive Approach KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. {{New Pargraph}} Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. � 81108482b5447d1a71c36756c4d45af3fbb7d0c7 146 145 2015-12-29T12:00:49Z Eddie 1 wikitext text/x-wiki THE TRADECRAFT Indicator Lists: Compiling Indications... Fundamentals of Indications Analysis….. Specifics of the Analytical Method . . . . . Strategic Cyber Early Warning - An Adaptive Approach KEWAS design is to be a much more inclusive warning system than current ‘out of the box’ solutions and to take account of the risks identified through an intelligence assessment and Center of Gravity methodology. To accomplish this task, the KEWAS is based on the informed judgment of analysts accordingly and in contrast to offerings by industry, the KEWAS relies on qualitative analytical processes, not the more mechanical measurement of multiple, precisely defined and specific events. As such, it covers not only threats to the organization’s computer networks, but also a wide variety of technical and non-technical risk indicators, including uncertainty and instability in and around the Area of Responsibility. {{New Paragraph}} Moreover, it both provides warning of any developing instability, crisis, threats, risks, or concerns that could impact on the security interests of the organization and it monitors deescalation of a crisis. After a Warning Problem is established, the KEWAS will monitor it on a monthly basis, or more if required. It is important to understand that "warning" is not an event, but a cyclical process in which an identifiable crisis or threat is assessed, a problem is defined and a critical indicator list is developed. {{New Paragraph}} KEWAS will not only assess an identifiable crisis or threat but will identify an issue of concern as early as possible, establish a critical indicator list which provides indicators of how and how fast this issue is developing, and provide warning as appropriate. Clearly, this difficult in today's more complex and varied security environment. Next, the critical indicators are continuously monitored and the assessment matrix is updated as required. Warning is issued, and the cycle resumes. The crucial subtext to this process is recognition that the effectiveness of the warning is dependent upon the extent to which it is integrated into the crisis-management and response measures available to decision-makers. 93b200b3acbee0fdb44cb6da14c4998260ce0a31 Template:Early Warning System Types 10 63 147 134 2015-12-29T12:01:52Z Eddie 1 /* EARLY WARNING SYSTEMS */ wikitext text/x-wiki == EARLY WARNING SYSTEMS == '''Crisis and catastrophic event based ''' Alert to prepare an effect resulting from disaster or crisis event - for purpose of this document the Alert focus EWS used to prepare are more commonly associated and familiar to the public. Common examples are those intended for alerting the public of an event measured by some type catastrophic effect from Warning data, most commonly for disaster or crisis. Severe weather, or indicators Warning of potential crisis are generally based on geographical, or socio-cultural aspects related to geopolitical issues within an area capable of describing which may or may not be geographically isolated Examples: Local, regional and national emergency severe weather emergency alerts, FEMA model crisis and response alerts, geographically local alerts of potential crisis or issues of safety to the public.. '''Activity and actor based ''' Warning to prevent, degrade, or disrupt effect of attack or activity action - much less commonly known to the public Early Warning Alert System used for an action based objective are highly evolved critical EWS immediately recognized requiring the importance across all services, followed by efforts eventually including military allies. Joint Early Warning Systems include an Airborne Early Warning and Control System (AWACS) is based on air operations and sensors monitoring for Warning indications. This is combined with an Intelligence Early Warning System enabled through working as a unified “Watch”. Together they provide what is arguably the most advanced in the capabilities possible due to the nature in member nations operating in unity of effort and unity to achieve. � e86ad4d8a7e9f42f72edcc74e2feb7842a536cd2 File:Early-Warning.jpg 6 66 171 2015-12-29T12:41:15Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Early-Warning-image.jpg 6 67 172 2015-12-29T12:41:33Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 173 172 2015-12-29T12:41:40Z Eddie 1 Eddie uploaded a new version of [[File:Early-Morning-image.jpg]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 175 173 2015-12-29T12:43:46Z Eddie 1 Eddie moved page [[File:Early-Morning-image.jpg]] to [[File:Early-Warning-image.jpg]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Effects.png 6 68 178 2015-12-29T12:56:59Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Effects-advr.png 6 69 181 2015-12-29T13:04:50Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Reachback Operations 0 43 183 125 2015-12-29T13:06:51Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 20f23558302c822ee2a8e0efc5b1fdf0ee54a32d MediaWiki:Sidebar 8 41 186 51 2015-12-31T18:17:38Z Eddie 1 wikitext text/x-wiki * navigation ** mainpage|mainpage-description * SEARCH * TOOLBOX * LANGUAGES 43b17573551f2b5f534c1d71fb36fa72b645c402 MediaWiki:Common.css 8 40 187 50 2015-12-31T18:40:24Z Eddie 1 css text/css /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } /* CSS placed here will be applied to all skins */ #ca-protect { display: none !important; } #ca-delete { display: none !important; } #ca-edit { display: none !important; } .toc, #toc { display: none; } 0f516229cf1ea93817313721c7dc29e38934889c 188 187 2015-12-31T18:45:26Z Eddie 1 css text/css /* CSS placed here will be applied to all skins */ .smwbuiltin a, .smwbuiltin a.new { color: #FF8000; } /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } /* CSS placed here will be applied to all skins */ #ca-protect { display: none !important; } #ca-delete { display: none !important; } #ca-edit { display: none !important; } .toc, #toc { display: none; } 8866ed8e90f2413e002c9cab241aeb485cc2e126 189 188 2015-12-31T18:48:13Z Eddie 1 css text/css /* CSS placed here will be applied to all skins */ .smwbuiltin a, .smwbuiltin a.new { color: #FF8000; } /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } /* CSS placed here will be applied to all skins */ #ca-protect { display: none !important; } #ca-delete { display: none !important; } .toc, #toc { display: none; } a31fb8cafba941a7c27e425ef344fcd52b77ac54 192 189 2016-01-01T00:09:05Z Eddie 1 css text/css /* CSS placed here will be applied to all skins */ .smwbuiltin a, .smwbuiltin a.new { color: #FF8000; } /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } /* CSS placed here will be applied to all skins */ #ca-protect { display: none !important; } #ca-delete { display: none !important; } .toc, #toc { display: none; } /** * SECTION: SMW-Style Infoboxes * * Many "infoboxes" (not using Template:Infobox) have/had the CSS below * manually entered into each table. This was the case in Template:Award * and Template:Person. Now, instead, those "infoboxes" simply list class= * "smw-style-infobox-table" because this type of "infobox" is similar to * what is used by SemanticMediaWiki and SemanticForms **/ .smw-style-infobox-table { width: 20em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: right; text-align: left; font-size: 92%; } .smw-style-infobox-table tr { vertical-align: top; } .smw-style-infobox-table-header { text-align: center; background-color: #ccccff; font-size: 15px; } /** * END SECTION: SMW-Style Infoboxes **/ .agenda { text-align: left; } .agenda th { border: 1px solid #555555; background-color: #eeeeee; text-align: center; font-size: 120%; } .agenda td { border: 1px solid #555555; padding: 10px; vertical-align: top; } /* Float Left-Right-Center */ .chart-float-right { float:right; margin-left:10px; margin-bottom:10px; clear:both; } .chart-float-left { margin-left:0px; margin-right:10px; float:left; clear:both; } .chart-center { display: inline-block; } 4128bf566fde2feca6d67d6053d95ea5f48abe07 Property:Has interest 102 70 190 2015-12-31T23:14:06Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Property:Parent related article 102 71 191 2015-12-31T23:16:10Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 CCOD 0 72 193 2016-01-01T03:00:10Z Eddie 1 Created page with "== CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2)..." wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. {{New Paragrah}} Favor the small and reusable: Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. {{New Paragraph}} Develop components with an understanding of the end user: Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. {{New Paragraph}} Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). {{New Paragraph}} Strongly consider RESTful architectures: This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. {{New Paragraph}} Strongly consider loose couplers: Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability [4] *KML for geo-referenced data [5] *WADL for RESTful services *CoT for tactical mission data interoperability [6] Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). {{New Paragraph}} Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. {{New Paragraph}} Emphasize documentation: Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. {{New Paragraph}} Separate visualization from function: One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. {{New Paragraph}} Accommodate dependencies: There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. {{New Paragraph}} Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. {{New Paragraph}} Seek operational context: Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). <br /> '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. <br /> '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 4da3aa0db00279d84801c628c07ce18d9d79c89a CCOD 0 72 194 193 2016-01-01T03:12:11Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. <br /> '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability [4] *KML for geo-referenced data [5] *WADL for RESTful services *CoT for tactical mission data interoperability [6] <br /> Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * Emphasize documentation: Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * Separate visualization from function: One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * Accommodate dependencies: There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * Seek operational context: Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. b8f644443fbbf7743ec0fd507736671eb6e1cb3c 195 194 2016-01-01T03:16:10Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. <br /> '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. <br /> * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability [4] *KML for geo-referenced data [5] *WADL for RESTful services *CoT for tactical mission data interoperability [6] <br /> Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. <br /> * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. <br /> * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. <br /> * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. <br /> * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. a29d324dc7109816ab5b4e21c5ab4faab9ec1955 196 195 2016-01-01T03:16:57Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. <br /> '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability [4] *KML for geo-referenced data [5] *WADL for RESTful services *CoT for tactical mission data interoperability [6] <br /> Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. <br /> * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. <br /> * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. <br /> * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. <br /> * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. ce1fac4467b417d55fc0e8063f7794c48557203d 197 196 2016-01-01T03:18:49Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. <br /> '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability <br /> Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. <br /> * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. <br /> * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. <br /> * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. <br /> * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 8d70c14788678d9aa43bd2a573dc1dd26e256e56 198 197 2016-01-01T03:22:45Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. <br /> '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. Make components discoverable: Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. f8d31abb5396e67de0706511ca9a3a076706c651 199 198 2016-01-01T03:26:19Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 033dfda1a6630a64a2a8ce039c992674d8663d4d 200 199 2016-01-01T03:27:37Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. <br /> '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> '''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). <br /> * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. cb5ab9ef07f1cb7b0f3db7756909fea5249ce663 201 200 2016-01-01T03:32:57Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 6229c474dc18410f81e07f46daae4118574f956e 202 201 2016-01-01T03:34:37Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). <br /> *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. <br /> * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 3e4037234484f09f511949ea62a6f4fcf38fcb4d 203 202 2016-01-01T03:36:02Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. 5b9cae889f17e6e89c581b8e2ea1dcd3fbc07f2d 204 203 2016-01-01T03:39:38Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: CCOD Best Practices }} {{#set:Title Icon=Target-icon.png}} 5d782508f0926190b6e8fad45b568ad4fd4ccf5a 205 204 2016-01-01T03:43:31Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard [3], which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: *UCore for mission data interoperability *KML for geo-referenced data *WADL for RESTful services *CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * Explicitly design component granularity: Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * Prepare design/artifacts and integration plan early to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * Scope the use of CCOD: CCOD represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: CCOD Best Practices }} {{#set:Title Icon=Target-icon.png}} 3844b16a1daf24c1a029860cfe0f8a39cecbe79e 206 205 2016-01-01T03:48:36Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. Focus on reuse: Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: # UCore for mission data interoperability # KML for geo-referenced data # WADL for RESTful services # CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * '''Explicitly design component granularity''': Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * '''Prepare design/artifacts and integration plan early''' to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * '''Scope the use of CCOD: CCOD''' represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: CCOD Best Practices }} {{#set:Title Icon=Target-icon.png}} c478a9096f34ae2fa278dc4c9b18cbd1f820ef9d 207 206 2016-01-01T03:50:41Z Eddie 1 wikitext text/x-wiki == CCOD Best Practices and Lessons Learned == These lessons have been derived from hands-on CCOD prototyping and operator-centric analyses of current Command and Control (C2) systems and workarounds, filtered through the lens of practiced distributed computing expertise. However, it should be emphasized that CCOD is still a budding concept, and these lessons are still forming. * '''Favor the small and reusable''': Using Occam's razor, where there is a choice between developing or using two or more components; usually, the small simpler one is preferred. A component should be "light weight" to ensure its ease of adoption and integration across a variety of users and uses. * '''Make components discoverable''': Ad-hoc mission-focused composability necessitates the ability to find the components and data best suited for a particular task in timely manner. A "marketplace" or "app store" concept is a useful construct for many CCOD environments. * '''Develop components with an understanding of the end user''': Early experience is leaning toward a design concept for CCOD that follows a multi-level producer/consumer design pattern. Some components will still be developed/composed by an engineer with operational/domain knowledge, but ultimately the promise of CCOD is fulfilled by the user/operator composing new functionality from existing components. Throughout the composition and use process, there are a number of users with differing roles and responsibilities: * Combat Coder or "Mashup Engineer" develops, prepares, and publishes the data and services for consumption. This engineer has operational/domain knowledge and can compose data and visualizations into raw application components for users. * Average users/operators tailor the raw application components to meet their specific needs, responsibilities, and preferences. This is the first layer of users who consume or interpret the data, potentially adding, modifying, or filtering it before sending it up the chain. This is a typical operator in a mission setting who has potentially complex, mission-centric responsibilities yet is not a computer programmer. * Commander is a high-level information consumer who combines data from a number of sources to make final decisions. * '''Focus on reuse''': Perhaps the greatest value of composable capability is the reuse of someone else's components and compositions. Each CCOD component should be reusable and generic allowing other CCOD projects to use it, particularly outside the direct composition environment. Each solution should be used by successive CCOD projects to build on previous experience and lessons learned. Where possible, use existing open source solutions/tools that have adoption momentum and are adequate to the task at hand (e.g., Restlet, PostgreSQL, PostGIS, Smile, Jetty). *'''Strongly consider RESTful architectures''': This framework has proven to be robust and flexible enough to allow for quick development and integration of components. Consider the Web Application Description Language (WADL) data standard which has been used to facilitate communication between RESTful services. While WADLs have some potential restrictions as a result of their simplicity, these restrictions were not a hindrance in a Department of Defense project using CCOD. In fact, it was an advantage to the implemented architecture. WADLs are intuitive, easy to write and understand, and require minimal effort for cross-service communication. * '''Strongly consider loose couplers''': Design components and services to be independent of one another through use of loose couplers. In some MITRE CCOD projects, effective loose couplers proved to be: # UCore for mission data interoperability # KML for geo-referenced data # WADL for RESTful services # CoT for tactical mission data interoperability Use standard industry data formats as loose couplers for ease of reuse, integration, and adoption of components. Loose couplers can reduce the number of required data translations from N2 to 2N. * '''Explicitly design component granularity''': Components of a composition must be at the appropriate abstraction level. For non-technical users to perform composition, the components must be abstract enough to be understood, flexible, and unusable. Minimize interaction between the components by using a loose coupler. Document dependencies between components/services. It is important to test the component abstraction level with the intended user population (e.g., average user, combat coder, etc.). * '''Prepare design/artifacts and integration plan early''' to mitigate integration challenges: Due to the challenge of integrating diverse components at run-time, it is important to develop system architecture and sequence diagrams in the early stages of a CCOD project. This helps build a strong foundation when later creating an integrated system. Where possible, use approved design patterns to enhance extensibility and understanding. It is important to clearly communicate the design and goal of the various project elements to the project team early in the process. It is important to have lower-level component tests along the way, to test each self-contained component, as well as enterprise-scope testing. Incorporate many iterations, with small increments to functionality, to enable testing. * '''Emphasize documentation''': Documentation is crucial for any system implementing CCOD principles. The goal is to have combat coders and average users who may be unfamiliar with any component/service leverage or reuse this functionality. Document early on and throughout the development process, and provide easy discovery and navigation of the documentation. Agree upon the documentation approach at the beginning of the project. As appropriate, use tools and formal modeling approaches to ease communication outside the project. * '''Separate visualization from function''': One CCOD-based prototype developed at MITRE could not naturally conform to a typical Model-View-Controller (MVC) design pattern, yet separation of the visualization from data components remained critical. Data only has to be exposed in simple standards to be visualized in useful ways. These include Hypertext Markup Language (HTML) tables, Extensible Markup Language (XML) (plain, Real Simple Syndication [RSS], geoRSS, KML, RESTful Web services), comma-separated values, etc. * '''Accommodate dependencies''': There is greater dependence and reliance on other systems' performance and availability in a CCOD system. If there are known performance issues, it is advisable to duplicate data sources, where possible, so that no piece of the system is completely dependent on an unreliable component. Document dependencies using a modeling paradigm as appropriate. * '''Scope the use of CCOD: CCOD''' represents a very large solution space. It is important to have a well-defined use case for CCOD that can be scoped within given resource and time restrictions. * '''Seek operational context''': Seek operational expertise early to define the operational scenarios and use cases to which a CCOD solution will be applied. Some use cases, situations, or entire systems may not be viable candidates for a CCOD approach (e.g., real-time semi-automated targeting systems). * '''Build from existing components''': Where possible, CCOD will provide capabilities built out of existing components discoverable and integratable on the network and/or adaptors interfacing with "non-composable" systems of record. Seek ways to provide composable "pieces" of large systems. * '''Verification/Validation''': All components should be tested to ensure that they operate as designed, prior to being integrated into the component repository or storefront. Developer testing should be documented so that users of components will be able to better understand the approved use and limitations of components. {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: CCOD Best Practices }} {{#set:Title Icon=Target-icon.png}} b8f14c46672420313d01fa59ae276722321505e9 Template:Translatable template name 10 82 335 220 2016-01-02T11:02:56Z Kaganer 0 namespace >> tntns wikitext text/x-wiki <includeonly>{{#invoke:Template translation{{{sandbox|}}}|getTranslatedTemplate|uselang={{{uselang|}}}|tntns={{{tntns|{{{namespace|}}}}}}|template={{#if:{{{noshift|}}}|{{{template}}}|{{{1}}}}}|noshift={{{noshift|}}}<!-- there are no other parameters here -->}}</includeonly><noinclude>{{documentation}}</noinclude> cf01b803bccfc7ef72e324dc96840b2d093194a4 220 2016-01-06T06:11:57Z Eddie 1 Created page with "<includeonly>{{#invoke:Template translation{{{sandbox|}}}|getTranslatedTemplate|uselang={{{uselang|}}}|tntns={{{tntns|{{{namespace|}}}}}}|template={{#if:{{{noshift|}}}|{{{temp..." wikitext text/x-wiki <includeonly>{{#invoke:Template translation{{{sandbox|}}}|getTranslatedTemplate|uselang={{{uselang|}}}|tntns={{{tntns|{{{namespace|}}}}}}|template={{#if:{{{noshift|}}}|{{{template}}}|{{{1}}}}}|noshift={{{noshift|}}}<!-- there are no other parameters here -->}}</includeonly><noinclude>{{documentation}}</noinclude> cf01b803bccfc7ef72e324dc96840b2d093194a4 Template:Navbar 10 99 287 240 2016-01-03T04:40:07Z Shirayuki 0 wikitext text/x-wiki <span class="noprint plainlinks navbar" style="{{{style|}}}"><small><!-- -->{{#if:{{{mini|}}}{{{plain|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">{{{text|This box:}}} </span>}}<!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#91;</span>}}<!-- --><span style="white-space:nowrap;word-spacing:-.12em;"><!-- -->[[{{ns:10}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="View this template"><!-- -->{{#if:{{{mini|}}}|v|view}}</span>]]<!-- --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[[{{ns:11}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="Discuss this template"><!-- -->{{#if:{{{mini|}}}|d|talk}}</span>]]<!-- -->{{#if:{{{noedit|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[{{fullurl:{{ns:10}}:{{{1}}}|action=edit}} <span style="{{{fontstyle|}}}" title="Edit this template"><!-- -->{{#if:{{{mini|}}}|e|edit}}</span>]}}<!-- --></span><!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#93;</span>}}<!-- --></small></span> <noinclude>{{doc}}</noinclude> 08cf4451d76bbca3ac4337d6976839bb230b2c9a 240 2016-01-06T06:51:44Z Eddie 1 Created page with "<span class="noprint plainlinks navbar" style="{{{style|}}}"><small><!-- -->{{#if:{{{mini|}}}{{{plain|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">{{{text|T..." wikitext text/x-wiki <span class="noprint plainlinks navbar" style="{{{style|}}}"><small><!-- -->{{#if:{{{mini|}}}{{{plain|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">{{{text|This box:}}} </span>}}<!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#91;</span>}}<!-- --><span style="white-space:nowrap;word-spacing:-.12em;"><!-- -->[[{{ns:10}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="View this template"><!-- -->{{#if:{{{mini|}}}|v|view}}</span>]]<!-- --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[[{{ns:11}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="Discuss this template"><!-- -->{{#if:{{{mini|}}}|d|talk}}</span>]]<!-- -->{{#if:{{{noedit|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[{{fullurl:{{ns:10}}:{{{1}}}|action=edit}} <span style="{{{fontstyle|}}}" title="Edit this template"><!-- -->{{#if:{{{mini|}}}|e|edit}}</span>]}}<!-- --></span><!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#93;</span>}}<!-- --></small></span> <noinclude>{{doc}}</noinclude> 08cf4451d76bbca3ac4337d6976839bb230b2c9a MediaWiki:Sf formedit edittitle 8 73 208 2016-01-05T20:31:03Z Eddie 1 Created page with "Edit {{#semantic-title:$2}}" wikitext text/x-wiki Edit {{#semantic-title:$2}} 1ac9be958821ef3e718b9ddaeb7787458b5f9983 Category:Hardening Guides 14 74 209 2016-01-06T02:18:51Z Eddie 1 Created page with "This is the Hardening Guides category." wikitext text/x-wiki This is the Hardening Guides category. 28f91b52e30219c21b6112d0ee32229bde3f8c52 Property:System 102 75 210 2016-01-06T02:59:44Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Date Issued 102 76 211 2016-01-06T03:07:51Z Eddie 1 Created a property of type [[Has type::Date]] wikitext text/x-wiki This is a property of type [[Has type::Date]]. 5263c8921631f25051f416df19a72490a588561e Property:Data Classification 102 77 212 2016-01-06T03:08:23Z Eddie 1 Created a property of type [[Has type::Code]] wikitext text/x-wiki This is a property of type [[Has type::Code]]. 6f45f32988880c7b04366a0b6d289e6358daddd8 213 212 2016-01-06T03:09:34Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Allows value::Public]] [[Allows value::Confidential]] [[Allows Value::Private]] 059a54240078d6dc9a1e9011df1dc815941273a9 214 213 2016-01-06T03:10:25Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Allows value::Public]] [[Allows value::Confidential]] faa27fdea90e472c063f7158487a22be0b4b484b Template:System Hardening Guide 10 78 215 2016-01-06T03:11:58Z Eddie 1 Created page with "<noinclude> This is the "System Hardening Guide" template. It should be called in the following format: <pre> {{System Hardening Guide |Title= |System= |Company Name= |Classif..." wikitext text/x-wiki <noinclude> This is the "System Hardening Guide" template. It should be called in the following format: <pre> {{System Hardening Guide |Title= |System= |Company Name= |Classification= |Date Issued= |Review Date= |Related to= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Title | [[Full Title::{{{Title|}}}]] |- ! System | {{{System|}}} |- ! Company Name | {{{Company Name|}}} |- ! Classification | {{{Classification|}}} |- ! Date Issued | {{{Date Issued|}}} |- ! Review Date | {{{Review Date|}}} |- ! Related to | [[Related to::{{{Related to|}}}]] |} [[Category:Guides]] </includeonly> a3172317d2029f51939949366693fd58eeb5269b Property:Exif data 102 79 216 2016-01-06T05:23:19Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Template:Extension 10 80 217 2016-01-06T06:08:51Z Eddie 1 Created page with "<noinclude> This is the "Extension" template. It should be called in the following format: <pre> {{Extension }} </pre> Edit the page to see the template text. </noinclude><inc..." wikitext text/x-wiki <noinclude> This is the "Extension" template. It should be called in the following format: <pre> {{Extension }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> b44a5371885e61528b3df5a60ab9812867fc081f 218 217 2016-01-06T06:09:23Z Eddie 1 wikitext text/x-wiki <includeonly>{{#if: {{{phabricator|}}} | {{ {{TNTN|Ptag}} |{{{phabricator}}}}} }} {| class="tpl-infobox ext-infobox ext-status-{{#switch: {{lc: {{{status|unknown}}} }} |unmaintained|archive|milestone|unstable|experimental|beta|stable|magic={{{status}}} |#default=unknown }}" cellspacing="0" |+ '''[[Special:MyLanguage/Manual:Extensions|MediaWiki extensions manual]]''' |- class="tpl-infobox-header ext-infobox-header" ! colspan="2" style="padding-top: 0.5em;" | [[File:{{#ifeq: {{{status|}}} |unstable|Crystal Clear app error.png|<!--else-->Crystal Clear action run.png}}|link=:Special:MyLanguage/Template:Extension#Content|left|40px]] <span style="font-size: 130%;">{{{name|{{PAGENAME}}}}}</span><br /> [[Extension status|Release status:]] {{#switch: {{lc: {{{status|unknown}}} }} |unmaintained|archive|milestone|unstable|experimental|beta|stable|magic={{{status}}} |#default=unknown }}<!-- Category logic -->{{#if:{{{license|}}}|{{#ifeq:{{{templatemode|}}}|nocats|<!-- do nothing -->|<!--else-->{{#invoke:Extension|getLicenseCategory|{{{license}}}}}}}}}<!-- -->{{#ifeq:{{{templatemode|}}}|nocats|<!-- do nothing -->|<!--else-->[[Category:{{#switch: {{lc:{{{status|}}} }} |unstable|experimental|stable = {{{status}}} extensions |beta = beta status extensions |unknown = extensions with unknown status |unmaintained = Not LTS ready |archive = archive extensions |milestone = milestone extensions |#default = extensions with invalid status }}{{translation}}]]}} |- {{#if:{{{image|}}}| {{!}} colspan="2" style="text-align: center;" {{!}} [[Image:{{{image}}}|{{{imagesize|220}}}px]] {{!}}- |{{#if:{{#translation:}}||[[Category:MediaWiki extensions without a screenshot]]}}}} {{#if:{{{type|}}}{{{type1|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#type|'''Implementation''']] {{!}} {{#invoke:Extension|getTypes}}<!-- -->|<!--else--><!-- -->{{#ifeq:{{{templatemode|}}}|nocats|<!-- nothing -->|<!--else--><!-- -->{{#invoke:Extension|getType|_missing_}}<!-- -->}}<!-- --> {{!}}- }} |- {{#if:{{{description|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#description|'''Description''']] {{!}} {{{description}}} {{!}}- }} {{#if:{{{author|}}}{{{username|}}} | {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#username|'''Author(s)''']] {{!}} {{#if: {{{username|}}} |<!-- -->{{#ifeq: {{{username}}}|{{{author|{{{username}}}<!-- -->}}}|<!-- nothing -->|<!--else--><!-- -->{{{author}}} (<!-- -->}}<!-- -->[[User:{{{username}}}|{{{username}}}]]<!-- --><sup>[[User talk:{{{username}}}|{{int:talkpagelinktext}}]]</sup><!-- -->{{#ifeq: {{{username}}}|{{{author|{{{username}}}<!-- -->}}}|<!-- nothing -->|<!--else--><!-- -->)<!-- -->}}<!-- -->|<!--else--><!-- -->{{{author}}}<!-- -->}} {{!}}- }} {{#if:{{{latest release version|{{{latest_release_version|{{{version|}}}}}}}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#version|'''Latest version''']] {{!}} {{{latest release version|{{{latest_release_version|{{{version|}}}}}}}}}{{#if:{{{latest release date|{{{latest_release_date|{{{update|}}}}}}}}}|&#160;({{{latest release date|{{{latest_release_date|{{{update}}})}}}}}}}} {{!}}- }} {{#if:{{{latest preview version|{{{latest_peview_version|{{{version_preview|{{{version preview|}}}}}}}}}}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#version|'''Latest preview version''']] {{!}} {{{latest preview version|{{{latest_preview_version|{{{version_preview|{{{version preview|}}}}}}}}}}}}{{#if:{{{latest preview version|{{{latest_preview_version|{{{update_preview|{{{update preview|}}}}}}}}}}}}|&#160;({{{latest preview version|{{{latest_preview_version|{{{update_preview|{{{update preview}}}}}}}}}}}})}} {{!}}- }} {{#if:{{{mediawiki|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#mediawiki|'''MediaWiki''']] {{!}} {{{mediawiki}}} {{!}}- }} {{#if:{{{php|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#php|'''PHP''']] {{!}} {{{php}}} {{!}}- }} {{#if:{{{needs-updatephp|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#needs-updatephp|<abbr title="'php update.php' needed after installation">'''Database&nbsp;changes'''</abbr>]] {{!}} {{#switch:{{{needs-updatephp}}}|yes|Yes=Yes|no|No=No|{{{needs-updatephp}}}}} {{!}}- }} {{#if:{{{composer|}}}| {{!}} style="vertical-align: top" {{!}} [[Composer|<abbr title="Supports 'Composer' for installation">'''Composer'''</abbr>]] {{!}} [https://packagist.org/packages/{{{composer}}} {{{composer}}}] {{#ifeq:{{{templatemode|}}}|nocats|<!-- do nothing -->|<!--else-->{{#if:{{{composer|}}}|[[Category:Extensions supporting Composer{{translation}}]]|}} }} }} {{!}}- {{#if:{{{table1|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#table1|'''Tables''']] {{!}} [[{{FULLPAGENAME}}/{{{table1}}} table|{{{table1}}}]]<!-- -->{{#if:{{{table2|}}}|<br />[[{{FULLPAGENAME}}/{{{table2}}} table|{{{table2}}}]]<!-- -->}}<!-- -->{{#if:{{{table3|}}}|<br />[[{{FULLPAGENAME}}/{{{table3}}} table|{{{table3}}}]]<!-- -->}}<!-- -->{{#if:{{{table4|}}}|<br />[[{{FULLPAGENAME}}/{{{table4}}} table|{{{table4}}}]]<!-- -->}}<!-- -->{{#if:{{{table5|}}}|<br />[[{{FULLPAGENAME}}/{{{table5}}} table|{{{table5}}}]]<!-- -->}}<!-- -->{{#if:{{{table6|}}}|<br />[[{{FULLPAGENAME}}/{{{table6}}} table|{{{table6}}}]]<!-- -->}}<!-- -->{{#if:{{{table7|}}}|<br />[[{{FULLPAGENAME}}/{{{table7}}} table|{{{table7}}}]]<!-- -->}}<!-- -->{{#if:{{{table8|}}}|<br />[[{{FULLPAGENAME}}/{{{table8}}} table|{{{table8}}}]]<!-- -->}}<!-- -->{{#if:{{{table9|}}}|<br />[[{{FULLPAGENAME}}/{{{table9}}} table|{{{table9}}}]]<!-- -->}}<!-- -->{{#if:{{{table10|}}}|<br />[[{{FULLPAGENAME}}/{{{table10}}} table|{{{table10}}}]]<!-- -->}} {{!}}- }} |- | style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#license|'''License''']] | {{#if:{{{license|}}}|{{#invoke:Extension|getFormattedLicense|{{{license}}}}}|No license specified{{#if:{{{nocats|}}}||[[Category:Extensions with no license specified{{translation}}]]}}}} |- | style="vertical-align: top" | '''Download''' | <!-- -->{{#if:{{{download|}}}|{{{download}}}|''No link''}}<!-- -->{{#if:{{{readme|}}}|<br />{{{readme}}}<!-- -->}}<!-- -->{{#if:{{{changelog|}}}|<br />{{{changelog}}}<!-- -->}} |- {{#if:{{{example|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#example|'''Example''']] {{!}} {{{example}}} {{!}}- }} {{#if:{{{namespace|}}}| {{!}} style="vertical-align: top" {{!}} [[Special:MyLanguage/Template:Extension#namespace|'''Namespace''']] {{!}} {{{namespace|}}} {{!}}- }} {{#if:{{{parameters|}}}| {{!}} style="padding: 0pt;" colspan="2" {{!}}<!-- --> {{{!}} class="mw-collapsible mw-collapsed" style="border-collapse: collapse; width: 100%;" {{!}}- ! style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[Special:MyLanguage/Template:Extension#parameters|'''Parameters''']] {{!}}- {{!}} {{{parameters}}} {{!}}} {{!}}- }} {{#if:{{{tags|}}}| {{!}} style="padding: 0pt;" colspan="2" {{!}} {{{!}} class="mw-collapsible mw-collapsed" style="border-collapse: collapse; width: 100%;" {{!}}- ! style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[Special:MyLanguage/Template:Extension#tags|'''Tags''']] {{!}}- {{!}} {{{tags}}} {{!}}} {{!}}- }} {{#if:{{{rights|}}}| {{!}} style="padding: 0pt;" colspan="2" {{!}} {{{!}} class="mw-collapsible mw-collapsed" style="border-collapse: collapse; width: 100%;" {{!}}- ! style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[Special:MyLanguage/Template:Extension#rights|'''Added rights''']] {{!}}- {{!}} {{{rights}}} {{#ifeq:{{{templatemode|}}}|nocats|<!-- do nothing -->|<!--else-->{{#if:{{{rights|}}}|[[Category:Extensions which add rights{{translation}}]]|}} }} {{!}}} {{!}}- }} {{#if:{{{hook1|}}}| {{!}} style="padding: 0pt;" colspan="2" {{!}} {{{!}} class="mw-collapsible mw-collapsed" style="border-collapse: collapse; width: 100%;" {{!}}- ! style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[Special:MyLanguage/Template:Extension#hook|'''Hooks used''']] {{!}}- {{!}}<!-- -->{{#ifeq:{{{templatemode|}}}|nocats|<!-- -->{{Foreach|Extension/HookInUseNoCats|delim=<br/>|<!-- -->{{{hook1}}}|{{{hook2|}}}|{{{hook3|}}}|{{{hook4|}}}|{{{hook5|}}}|{{{hook6|}}}|<!-- -->{{{hook7|}}}|{{{hook8|}}}|{{{hook9|}}}|{{{hook10|}}}|{{{hook11|}}}|{{{hook12|}}}|<!-- -->{{{hook13|}}}|{{{hook14|}}}|{{{hook15|}}}|{{{hook16|}}}|{{{hook17|}}}|{{{hook18|}}}|<!-- -->{{{hook19|}}}|{{{hook20|}}}|{{{hook21|}}}|{{{hook22|}}}|{{{hook23|}}}|{{{hook24|}}}|<!-- -->{{{hook25|}}}|{{{hook26|}}}|{{{hook27|}}}|{{{hook28|}}}|{{{hook29|}}}|{{{hook30|}}}|<!-- -->{{{hook31|}}}|{{{hook32|}}}|{{{hook33|}}}|{{{hook34|}}}|{{{hook35|}}}|{{{hook36|}}}|<!-- -->{{{hook37|}}}|{{{hook38|}}}|{{{hook39|}}}|{{{hook40|}}}|{{{hook41|}}}|{{{hook42|}}}|<!-- -->{{{hook43|}}}|{{{hook44|}}}|{{{hook45|}}}|{{{hook46|}}}|{{{hook47|}}}|{{{hook48|}}}<!-- -->}}<!-- -->|<!--else--><!-- -->{{Foreach|Extension/HookInUse|delim=<br/>|<!-- -->{{{hook1}}}|{{{hook2|}}}|{{{hook3|}}}|{{{hook4|}}}|{{{hook5|}}}|{{{hook6|}}}|<!-- -->{{{hook7|}}}|{{{hook8|}}}|{{{hook9|}}}|{{{hook10|}}}|{{{hook11|}}}|{{{hook12|}}}|<!-- -->{{{hook13|}}}|{{{hook14|}}}|{{{hook15|}}}|{{{hook16|}}}|{{{hook17|}}}|{{{hook18|}}}|<!-- -->{{{hook19|}}}|{{{hook20|}}}|{{{hook21|}}}|{{{hook22|}}}|{{{hook23|}}}|{{{hook24|}}}|<!-- -->{{{hook25|}}}|{{{hook26|}}}|{{{hook27|}}}|{{{hook28|}}}|{{{hook29|}}}|{{{hook30|}}}|<!-- -->{{{hook31|}}}|{{{hook32|}}}|{{{hook33|}}}|{{{hook34|}}}|{{{hook35|}}}|{{{hook36|}}}|<!-- -->{{{hook37|}}}|{{{hook38|}}}|{{{hook39|}}}|{{{hook40|}}}|{{{hook41|}}}|{{{hook42|}}}|<!-- -->{{{hook43|}}}|{{{hook44|}}}|{{{hook45|}}}|{{{hook46|}}}|{{{hook47|}}}|{{{hook48|}}}<!-- -->}}<!-- -->}}<!-- --> {{!}}} {{!}}- }} {{#if:{{{newhook1|}}}| {{!}} style="padding: 0pt;" colspan="2" {{!}} {{{!}} class="mw-collapsible mw-collapsed" style="border-collapse: collapse; width: 100%;" {{!}}- ! style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[Special:MyLanguage/Template:Extension#newhook|'''Hooks provided''']] {{!}}- {{!}}<!-- -->{{Foreach|Extension/HookProvided|delim=<br/>|<!-- -->{{{newhook1}}}|{{{newhook2|}}}|{{{newhook3|}}}|{{{newhook4|}}}|{{{newhook5|}}}|{{{newhook6|}}}|<!-- -->{{{newhook7|}}}|{{{newhook8|}}}|{{{newhook9|}}}|{{{newhook10|}}}|{{{newhook11|}}}|{{{newhook12|}}}|<!-- -->{{{newhook13|}}}|{{{newhook14|}}}|{{{newhook15|}}}|{{{newhook16|}}}|{{{newhook17|}}}|{{{newhook18|}}}|<!-- -->{{{newhook19|}}}|{{{newhook20|}}}|{{{newhook21|}}}|{{{newhook22|}}}|{{{newhook23|}}}|{{{newhook24|}}}|<!-- -->{{{newhook25|}}}|{{{newhook26|}}}|{{{newhook27|}}}|{{{newhook28|}}}|{{{newhook29|}}}|{{{newhook30|}}}|<!-- -->{{{newhook31|}}}|{{{newhook32|}}}|{{{newhook33|}}}|{{{newhook34|}}}|{{{newhook35|}}}|{{{newhook36|}}}|<!-- -->{{{newhook37|}}}|{{{newhook38|}}}|{{{newhook39|}}}|{{{newhook40|}}}|{{{newhook41|}}}|{{{newhook42|}}}|<!-- -->{{{newhook43|}}}|{{{newhook44|}}}|{{{newhook45|}}}|{{{newhook46|}}}|{{{newhook47|}}}|{{{newhook48|}}}<!-- -->}}<!-- --> {{!}}} {{!}}- }} {{#if:{{{compatibility|}}}| {{!}} colspan="2" {{!}} {{{compatibility}}} {{!}}- }} {{!}} colspan="2" style="text-align:center;" {{!}} [[translatewiki:Special:Translate/{{{translate|ext-{{lc:{{#invoke:String/enwiki|replace|{{BASEPAGENAME}}| |}}}}}}}|Translate the {{BASEPAGENAME}} extension]] if it is available at translatewiki.net {{!}}- {{!}} colspan="2" style="text-align:center;" {{!}}<!-- Note: this next check suppresses the 'Check usage' link if page is: a subpage, not in Extension: namespace, or if suppressed by 'templatemode=nocats' or 'nousage=true'. -->{{#if:{{{nousage|{{#ifeq:{{{templatemode|}}}|nocats |no usage |{{#ifeq:{{NAMESPACE}}|{{ns:102}} | |no usage }} {{#ifeq:{{{templatemode|}}}|nousage |no usage }} }}}}} |<!-- no usage -->| Check [[wikiapiary:Extension:{{{CheckUsageNameOverride|{{BASEPAGENAMEE}}}}}|usage&nbsp;and&nbsp;version&nbsp;matrix]]; [https://git.wikimedia.org/metrics/mediawiki%2Fextensions%2F{{{CheckUsageNameOverride|{{BASEPAGENAMEE}}}}} code&nbsp;metrics]<!-- -->}} {{#if:{{{vagrant-role|}}} | {{!}}- {{!}} style="vertical-align: top; text-align: left; padding: 0.2em 0.5em;" {{!}} [[MediaWiki-Vagrant#Using_roles{{!}}'''Vagrant role''']] {{!}} [https://doc.wikimedia.org/mediawiki-vagrant/classes/role/{{{vagrant-role}}}.html {{{vagrant-role}}}] }} {{!}}- {{#if: {{{phabricator|{{{bugzilla|}}}}}} | {{!}} style="vertical-align: top" {{!}} '''[[Phabricator|Issues]]:''' {{!}}[[phab:tag/{{lc:{{{phabricator|MediaWiki-extensions-{{{bugzilla}}}}}}}}|Open tasks]] · [https://phabricator.wikimedia.org/maniphest/task/create/?projects={{{phabricator|MediaWiki-extensions-{{{bugzilla}}}}}} Report a bug] {{!}}- }} |}<!-- -->{{#ifeq:{{{templatemode|}}}|nocats|<!-- nothing--><!-- -->|<!--else--><!-- -->{{DEFAULTSORT:{{#if:{{{name|}}}|<!-- -->{{uc:{{{name}}}<!-- -->}}<!-- -->|<!--else--><!-- -->{{uc:{{PAGENAME}}<!-- -->}}<!-- -->}}<!-- -->}}<!-- -->[[Category:All extensions{{translation}}]]<!-- -->}}</includeonly><noinclude>{{ {{TNTN|Documentation}} }} [[Category:Info templates{{translation}}|{{PAGENAME}}]] [[Category:Extension creation{{translation}}]] [[Category:Categorizing templates{{translation}}|{{PAGENAME}}]] [[Category:Extension templates{{translation}}]] {{languages|Template:Extension}} </noinclude> 014b01e5b79ade1561902db5dc5c7e8f1adcc071 Template:TNTN 10 81 219 2016-01-06T06:11:05Z Eddie 1 Redirected page to [[Template:Translatable template name]] wikitext text/x-wiki #REDIRECT [[Template:Translatable template name]] 51aba18c9e7edde0de5272258792895d16b983c2 Module:Documentation 0 83 221 2016-01-06T06:14:00Z Eddie 1 Created page with "-- This module implements {{documentation}}. -- Get required modules. local getArgs = require('Module:Arguments').getArgs local messageBox = require('Module:Message box') --..." wikitext text/x-wiki -- This module implements {{documentation}}. -- Get required modules. local getArgs = require('Module:Arguments').getArgs local messageBox = require('Module:Message box') -- Get the config table. local cfg = mw.loadData('Module:Documentation/config') local p = {} -- Often-used functions. local ugsub = mw.ustring.gsub ---------------------------------------------------------------------------- -- Helper functions -- -- These are defined as local functions, but are made available in the p -- table for testing purposes. ---------------------------------------------------------------------------- local function message(cfgKey, valArray, expectType) --[[ -- Gets a message from the cfg table and formats it if appropriate. -- The function raises an error if the value from the cfg table is not -- of the type expectType. The default type for expectType is 'string'. -- If the table valArray is present, strings such as $1, $2 etc. in the -- message are substituted with values from the table keys [1], [2] etc. -- For example, if the message "foo-message" had the value 'Foo $2 bar $1.', -- message('foo-message', {'baz', 'qux'}) would return "Foo qux bar baz." --]] local msg = cfg[cfgKey] expectType = expectType or 'string' if type(msg) ~= expectType then error('message: type error in message cfg.' .. cfgKey .. ' (' .. expectType .. ' expected, got ' .. type(msg) .. ')', 2) end if not valArray then return msg end local function getMessageVal(match) match = tonumber(match) return valArray[match] or error('message: no value found for key $' .. match .. ' in message cfg.' .. cfgKey, 4) end local ret = ugsub(msg, '$([1-9][0-9]*)', getMessageVal) return ret end p.message = message local function makeWikilink(page, display) if display then return mw.ustring.format('[[%s|%s]]', page, display) else return mw.ustring.format('[[%s]]', page) end end p.makeWikilink = makeWikilink local function makeCategoryLink(cat, sort) local catns = mw.site.namespaces[14].name return makeWikilink(catns .. ':' .. cat, sort) end p.makeCategoryLink = makeCategoryLink local function makeUrlLink(url, display) return mw.ustring.format('[%s %s]', url, display) end p.makeUrlLink = makeUrlLink local function makeToolbar(...) local ret = {} local lim = select('#', ...) if lim < 1 then return nil end for i = 1, lim do ret[#ret + 1] = select(i, ...) end return '<small style="font-style: normal;">(' .. table.concat(ret, ' &#124; ') .. ')</small>' end p.makeToolbar = makeToolbar ---------------------------------------------------------------------------- -- Argument processing ---------------------------------------------------------------------------- local function makeInvokeFunc(funcName) return function (frame) local args = getArgs(frame, { valueFunc = function (key, value) if type(value) == 'string' then value = value:match('^%s*(.-)%s*$') -- Remove whitespace. if key == 'heading' or value ~= '' then return value else return nil end else return value end end }) return p[funcName](args) end end ---------------------------------------------------------------------------- -- Main function ---------------------------------------------------------------------------- p.main = makeInvokeFunc('_main') function p._main(args) --[[ -- This function defines logic flow for the module. -- @args - table of arguments passed by the user -- -- Messages: -- 'main-div-id' --> 'template-documentation' -- 'main-div-classes' --> 'template-documentation iezoomfix' --]] local env = p.getEnvironment(args) local root = mw.html.create() root :wikitext(p.protectionTemplate(env)) :wikitext(p.sandboxNotice(args, env)) -- This div tag is from {{documentation/start box}}, but moving it here -- so that we don't have to worry about unclosed tags. :tag('div') :attr('id', message('main-div-id')) :addClass(message('main-div-classes')) :css('padding', '12px') :newline() :wikitext(p._startBox(args, env)) :wikitext(p._content(args, env)) :tag('div') :css('clear', 'both') -- So right or left floating items don't stick out of the doc box. :newline() :done() :done() :wikitext(p._endBox(args, env)) :wikitext(p.addTrackingCategories(env)) return tostring(root) end ---------------------------------------------------------------------------- -- Environment settings ---------------------------------------------------------------------------- function p.getEnvironment(args) --[[ -- Returns a table with information about the environment, including title objects and other namespace- or -- path-related data. -- @args - table of arguments passed by the user -- -- Title objects include: -- env.title - the page we are making documentation for (usually the current title) -- env.templateTitle - the template (or module, file, etc.) -- env.docTitle - the /doc subpage. -- env.sandboxTitle - the /sandbox subpage. -- env.testcasesTitle - the /testcases subpage. -- env.printTitle - the print version of the template, located at the /Print subpage. -- -- Data includes: -- env.protectionLevels - the protection levels table of the title object. -- env.subjectSpace - the number of the title's subject namespace. -- env.docSpace - the number of the namespace the title puts its documentation in. -- env.docpageBase - the text of the base page of the /doc, /sandbox and /testcases pages, with namespace. -- env.compareUrl - URL of the Special:ComparePages page comparing the sandbox with the template. -- -- All table lookups are passed through pcall so that errors are caught. If an error occurs, the value -- returned will be nil. --]] local env, envFuncs = {}, {} -- Set up the metatable. If triggered we call the corresponding function in the envFuncs table. The value -- returned by that function is memoized in the env table so that we don't call any of the functions -- more than once. (Nils won't be memoized.) setmetatable(env, { __index = function (t, key) local envFunc = envFuncs[key] if envFunc then local success, val = pcall(envFunc) if success then env[key] = val -- Memoise the value. return val end end return nil end }) function envFuncs.title() -- The title object for the current page, or a test page passed with args.page. local title local titleArg = args.page if titleArg then title = mw.title.new(titleArg) else title = mw.title.getCurrentTitle() end return title end function envFuncs.templateTitle() --[[ -- The template (or module, etc.) title object. -- Messages: -- 'sandbox-subpage' --> 'sandbox' -- 'testcases-subpage' --> 'testcases' --]] local subjectSpace = env.subjectSpace local title = env.title local subpage = title.subpageText if subpage == message('sandbox-subpage') or subpage == message('testcases-subpage') then return mw.title.makeTitle(subjectSpace, title.baseText) else return mw.title.makeTitle(subjectSpace, title.text) end end function envFuncs.docTitle() --[[ -- Title object of the /doc subpage. -- Messages: -- 'doc-subpage' --> 'doc' --]] local title = env.title local docname = args[1] -- User-specified doc page. local docpage if docname then docpage = docname else docpage = env.docpageBase .. '/' .. message('doc-subpage') end return mw.title.new(docpage) end function envFuncs.sandboxTitle() --[[ -- Title object for the /sandbox subpage. -- Messages: -- 'sandbox-subpage' --> 'sandbox' --]] return mw.title.new(env.docpageBase .. '/' .. message('sandbox-subpage')) end function envFuncs.testcasesTitle() --[[ -- Title object for the /testcases subpage. -- Messages: -- 'testcases-subpage' --> 'testcases' --]] return mw.title.new(env.docpageBase .. '/' .. message('testcases-subpage')) end function envFuncs.printTitle() --[[ -- Title object for the /Print subpage. -- Messages: -- 'print-subpage' --> 'Print' --]] return env.templateTitle:subPageTitle(message('print-subpage')) end function envFuncs.protectionLevels() -- The protection levels table of the title object. return env.title.protectionLevels end function envFuncs.subjectSpace() -- The subject namespace number. return mw.site.namespaces[env.title.namespace].subject.id end function envFuncs.docSpace() -- The documentation namespace number. For most namespaces this is the same as the -- subject namespace. However, pages in the Article, File, MediaWiki or Category -- namespaces must have their /doc, /sandbox and /testcases pages in talk space. local subjectSpace = env.subjectSpace if subjectSpace == 0 or subjectSpace == 6 or subjectSpace == 8 or subjectSpace == 14 then return subjectSpace + 1 else return subjectSpace end end function envFuncs.docpageBase() -- The base page of the /doc, /sandbox, and /testcases subpages. -- For some namespaces this is the talk page, rather than the template page. local templateTitle = env.templateTitle local docSpace = env.docSpace local docSpaceText = mw.site.namespaces[docSpace].name -- Assemble the link. docSpace is never the main namespace, so we can hardcode the colon. return docSpaceText .. ':' .. templateTitle.text end function envFuncs.compareUrl() -- Diff link between the sandbox and the main template using [[Special:ComparePages]]. local templateTitle = env.templateTitle local sandboxTitle = env.sandboxTitle if templateTitle.exists and sandboxTitle.exists then local compareUrl = mw.uri.fullUrl( 'Special:ComparePages', {page1 = templateTitle.prefixedText, page2 = sandboxTitle.prefixedText} ) return tostring(compareUrl) else return nil end end return env end ---------------------------------------------------------------------------- -- Auxiliary templates ---------------------------------------------------------------------------- function p.sandboxNotice(args, env) --[=[ -- Generates a sandbox notice for display above sandbox pages. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'sandbox-notice-image' --> '[[Image:Sandbox.svg|50px|alt=|link=]]' -- 'sandbox-notice-blurb' --> 'This is the $1 for $2.' -- 'sandbox-notice-diff-blurb' --> 'This is the $1 for $2 ($3).' -- 'sandbox-notice-pagetype-template' --> '[[Wikipedia:Template test cases|template sandbox]] page' -- 'sandbox-notice-pagetype-module' --> '[[Wikipedia:Template test cases|module sandbox]] page' -- 'sandbox-notice-pagetype-other' --> 'sandbox page' -- 'sandbox-notice-compare-link-display' --> 'diff' -- 'sandbox-notice-testcases-blurb' --> 'See also the companion subpage for $1.' -- 'sandbox-notice-testcases-link-display' --> 'test cases' -- 'sandbox-category' --> 'Template sandboxes' --]=] local title = env.title local sandboxTitle = env.sandboxTitle local templateTitle = env.templateTitle local subjectSpace = env.subjectSpace if not (subjectSpace and title and sandboxTitle and templateTitle and mw.title.equals(title, sandboxTitle)) then return nil end -- Build the table of arguments to pass to {{ombox}}. We need just two fields, "image" and "text". local omargs = {} omargs.image = message('sandbox-notice-image') -- Get the text. We start with the opening blurb, which is something like -- "This is the template sandbox for [[Template:Foo]] (diff)." local text = '' local frame = mw.getCurrentFrame() local isPreviewing = frame:preprocess('{{REVISIONID}}') == '' -- True if the page is being previewed. local pagetype if subjectSpace == 10 then pagetype = message('sandbox-notice-pagetype-template') elseif subjectSpace == 828 then pagetype = message('sandbox-notice-pagetype-module') else pagetype = message('sandbox-notice-pagetype-other') end local templateLink = makeWikilink(templateTitle.prefixedText) local compareUrl = env.compareUrl if isPreviewing or not compareUrl then text = text .. message('sandbox-notice-blurb', {pagetype, templateLink}) else local compareDisplay = message('sandbox-notice-compare-link-display') local compareLink = makeUrlLink(compareUrl, compareDisplay) text = text .. message('sandbox-notice-diff-blurb', {pagetype, templateLink, compareLink}) end -- Get the test cases page blurb if the page exists. This is something like -- "See also the companion subpage for [[Template:Foo/testcases|test cases]]." local testcasesTitle = env.testcasesTitle if testcasesTitle and testcasesTitle.exists then if testcasesTitle.namespace == mw.site.namespaces.Module.id then local testcasesLinkDisplay = message('sandbox-notice-testcases-link-display') local testcasesRunLinkDisplay = message('sandbox-notice-testcases-run-link-display') local testcasesLink = makeWikilink(testcasesTitle.prefixedText, testcasesLinkDisplay) local testcasesRunLink = makeWikilink(testcasesTitle.talkPageTitle.prefixedText, testcasesRunLinkDisplay) text = text .. '<br />' .. message('sandbox-notice-testcases-run-blurb', {testcasesLink, testcasesRunLink}) else local testcasesLinkDisplay = message('sandbox-notice-testcases-link-display') local testcasesLink = makeWikilink(testcasesTitle.prefixedText, testcasesLinkDisplay) text = text .. '<br />' .. message('sandbox-notice-testcases-blurb', {testcasesLink}) end end -- Add the sandbox to the sandbox category. text = text .. makeCategoryLink(message('sandbox-category')) omargs.text = text local ret = '<div style="clear: both;"></div>' ret = ret .. messageBox.main('ombox', omargs) return ret end function p.protectionTemplate(env) -- Generates the padlock icon in the top right. -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- Messages: -- 'protection-template' --> 'pp-template' -- 'protection-template-args' --> {docusage = 'yes'} local title = env.title local protectionLevels local protectionTemplate = message('protection-template') local namespace = title.namespace if not (protectionTemplate and (namespace == 10 or namespace == 828)) then -- Don't display the protection template if we are not in the template or module namespaces. return nil end protectionLevels = env.protectionLevels if not protectionLevels then return nil end local editLevels = protectionLevels.edit local moveLevels = protectionLevels.move if moveLevels and moveLevels[1] == 'sysop' or editLevels and editLevels[1] then -- The page is full-move protected, or full, template, or semi-protected. local frame = mw.getCurrentFrame() return frame:expandTemplate{title = protectionTemplate, args = message('protection-template-args', nil, 'table')} else return nil end end ---------------------------------------------------------------------------- -- Start box ---------------------------------------------------------------------------- p.startBox = makeInvokeFunc('_startBox') function p._startBox(args, env) --[[ -- This function generates the start box. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- The actual work is done by p.makeStartBoxLinksData and p.renderStartBoxLinks which make -- the [view] [edit] [history] [purge] links, and by p.makeStartBoxData and p.renderStartBox -- which generate the box HTML. --]] env = env or p.getEnvironment(args) local links local content = args.content if not content then -- No need to include the links if the documentation is on the template page itself. local linksData = p.makeStartBoxLinksData(args, env) if linksData then links = p.renderStartBoxLinks(linksData) end end -- Generate the start box html. local data = p.makeStartBoxData(args, env, links) if data then return p.renderStartBox(data) else -- User specified no heading. return nil end end function p.makeStartBoxLinksData(args, env) --[[ -- Does initial processing of data to make the [view] [edit] [history] [purge] links. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'view-link-display' --> 'view' -- 'edit-link-display' --> 'edit' -- 'history-link-display' --> 'history' -- 'purge-link-display' --> 'purge' -- 'file-docpage-preload' --> 'Template:Documentation/preload-filespace' -- 'module-preload' --> 'Template:Documentation/preload-module-doc' -- 'docpage-preload' --> 'Template:Documentation/preload' -- 'create-link-display' --> 'create' --]] local subjectSpace = env.subjectSpace local title = env.title local docTitle = env.docTitle if not title or not docTitle then return nil end local data = {} data.title = title data.docTitle = docTitle -- View, display, edit, and purge links if /doc exists. data.viewLinkDisplay = message('view-link-display') data.editLinkDisplay = message('edit-link-display') data.historyLinkDisplay = message('history-link-display') data.purgeLinkDisplay = message('purge-link-display') -- Create link if /doc doesn't exist. local preload = args.preload if not preload then if subjectSpace == 6 then -- File namespace preload = message('file-docpage-preload') elseif subjectSpace == 828 then -- Module namespace preload = message('module-preload') else preload = message('docpage-preload') end end data.preload = preload data.createLinkDisplay = message('create-link-display') return data end function p.renderStartBoxLinks(data) --[[ -- Generates the [view][edit][history][purge] or [create] links from the data table. -- @data - a table of data generated by p.makeStartBoxLinksData --]] local function escapeBrackets(s) -- Escapes square brackets with HTML entities. s = s:gsub('%[', '&#91;') -- Replace square brackets with HTML entities. s = s:gsub('%]', '&#93;') return s end local ret local docTitle = data.docTitle local title = data.title if docTitle.exists then local viewLink = makeWikilink(docTitle.prefixedText, data.viewLinkDisplay) local editLink = makeUrlLink(docTitle:fullUrl{action = 'edit'}, data.editLinkDisplay) local historyLink = makeUrlLink(docTitle:fullUrl{action = 'history'}, data.historyLinkDisplay) local purgeLink = makeUrlLink(title:fullUrl{action = 'purge'}, data.purgeLinkDisplay) ret = '[%s] [%s] [%s] [%s]' ret = escapeBrackets(ret) ret = mw.ustring.format(ret, viewLink, editLink, historyLink, purgeLink) else local createLink = makeUrlLink(docTitle:fullUrl{action = 'edit', preload = data.preload}, data.createLinkDisplay) ret = '[%s]' ret = escapeBrackets(ret) ret = mw.ustring.format(ret, createLink) end return ret end function p.makeStartBoxData(args, env, links) --[=[ -- Does initial processing of data to pass to the start-box render function, p.renderStartBox. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- @links - a string containing the [view][edit][history][purge] links - could be nil if there's an error. -- -- Messages: -- 'documentation-icon-wikitext' --> '[[File:Test Template Info-Icon - Version (2).svg|50px|link=|alt=Documentation icon]]' -- 'template-namespace-heading' --> 'Template documentation' -- 'module-namespace-heading' --> 'Module documentation' -- 'file-namespace-heading' --> 'Summary' -- 'other-namespaces-heading' --> 'Documentation' -- 'start-box-linkclasses' --> 'mw-editsection-like plainlinks' -- 'start-box-link-id' --> 'doc_editlinks' -- 'testcases-create-link-display' --> 'create' --]=] local subjectSpace = env.subjectSpace if not subjectSpace then -- Default to an "other namespaces" namespace, so that we get at least some output -- if an error occurs. subjectSpace = 2 end local data = {} -- Heading local heading = args.heading -- Blank values are not removed. if heading == '' then -- Don't display the start box if the heading arg is defined but blank. return nil end if heading then data.heading = heading elseif subjectSpace == 10 then -- Template namespace data.heading = message('documentation-icon-wikitext') .. ' ' .. message('template-namespace-heading') elseif subjectSpace == 828 then -- Module namespace data.heading = message('documentation-icon-wikitext') .. ' ' .. message('module-namespace-heading') elseif subjectSpace == 6 then -- File namespace data.heading = message('file-namespace-heading') else data.heading = message('other-namespaces-heading') end -- Heading CSS local headingStyle = args['heading-style'] if headingStyle then data.headingStyleText = headingStyle elseif subjectSpace == 10 then -- We are in the template or template talk namespaces. data.headingFontWeight = 'bold' data.headingFontSize = '125%' else data.headingFontSize = '150%' end -- Data for the [view][edit][history][purge] or [create] links. if links then data.linksClass = message('start-box-linkclasses') data.linksId = message('start-box-link-id') data.links = links end return data end function p.renderStartBox(data) -- Renders the start box html. -- @data - a table of data generated by p.makeStartBoxData. local sbox = mw.html.create('div') sbox :css('padding-bottom', '3px') :css('border-bottom', '1px solid #aaa') :css('margin-bottom', '1ex') :newline() :tag('span') :cssText(data.headingStyleText) :css('font-weight', data.headingFontWeight) :css('font-size', data.headingFontSize) :wikitext(data.heading) local links = data.links if links then sbox:tag('span') :addClass(data.linksClass) :attr('id', data.linksId) :wikitext(links) end return tostring(sbox) end ---------------------------------------------------------------------------- -- Documentation content ---------------------------------------------------------------------------- p.content = makeInvokeFunc('_content') function p._content(args, env) -- Displays the documentation contents -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment env = env or p.getEnvironment(args) local docTitle = env.docTitle local content = args.content if not content and docTitle and docTitle.exists then content = args._content or mw.getCurrentFrame():expandTemplate{title = docTitle.prefixedText} end -- The line breaks below are necessary so that "=== Headings ===" at the start and end -- of docs are interpreted correctly. return '\n' .. (content or '') .. '\n' end p.contentTitle = makeInvokeFunc('_contentTitle') function p._contentTitle(args, env) env = env or p.getEnvironment(args) local docTitle = env.docTitle if not args.content and docTitle and docTitle.exists then return docTitle.prefixedText else return '' end end ---------------------------------------------------------------------------- -- End box ---------------------------------------------------------------------------- p.endBox = makeInvokeFunc('_endBox') function p._endBox(args, env) --[=[ -- This function generates the end box (also known as the link box). -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'fmbox-id' --> 'documentation-meta-data' -- 'fmbox-style' --> 'background-color: #ecfcf4' -- 'fmbox-textstyle' --> 'font-style: italic' -- -- The HTML is generated by the {{fmbox}} template, courtesy of [[Module:Message box]]. --]=] -- Get environment data. env = env or p.getEnvironment(args) local subjectSpace = env.subjectSpace local docTitle = env.docTitle if not subjectSpace or not docTitle then return nil end -- Check whether we should output the end box at all. Add the end -- box by default if the documentation exists or if we are in the -- user, module or template namespaces. local linkBox = args['link box'] if linkBox == 'off' or not ( docTitle.exists or subjectSpace == 2 or subjectSpace == 828 or subjectSpace == 10 ) then return nil end -- Assemble the arguments for {{fmbox}}. local fmargs = {} fmargs.id = message('fmbox-id') -- Sets 'documentation-meta-data' fmargs.image = 'none' fmargs.style = message('fmbox-style') -- Sets 'background-color: #ecfcf4' fmargs.textstyle = message('fmbox-textstyle') -- 'font-style: italic;' -- Assemble the fmbox text field. local text = '' if linkBox then text = text .. linkBox else text = text .. (p.makeDocPageBlurb(args, env) or '') -- "This documentation is transcluded from [[Foo]]." if subjectSpace == 2 or subjectSpace == 10 or subjectSpace == 828 then -- We are in the user, template or module namespaces. -- Add sandbox and testcases links. -- "Editors can experiment in this template's sandbox and testcases pages." text = text .. (p.makeExperimentBlurb(args, env) or '') text = text .. '<br />' if not args.content and not args[1] then -- "Please add categories to the /doc subpage." -- Don't show this message with inline docs or with an explicitly specified doc page, -- as then it is unclear where to add the categories. text = text .. (p.makeCategoriesBlurb(args, env) or '') end text = text .. ' ' .. (p.makeSubpagesBlurb(args, env) or '') --"Subpages of this template" local printBlurb = p.makePrintBlurb(args, env) -- Two-line blurb about print versions of templates. if printBlurb then text = text .. '<br />' .. printBlurb end end end fmargs.text = text return messageBox.main('fmbox', fmargs) end function p.makeDocPageBlurb(args, env) --[=[ -- Makes the blurb "This documentation is transcluded from [[Template:Foo]] (edit, history)". -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'edit-link-display' --> 'edit' -- 'history-link-display' --> 'history' -- 'transcluded-from-blurb' --> -- 'The above [[Wikipedia:Template documentation|documentation]] -- is [[Wikipedia:Transclusion|transcluded]] from $1.' -- 'module-preload' --> 'Template:Documentation/preload-module-doc' -- 'create-link-display' --> 'create' -- 'create-module-doc-blurb' --> -- 'You might want to $1 a documentation page for this [[Wikipedia:Lua|Scribunto module]].' --]=] local docTitle = env.docTitle if not docTitle then return nil end local ret if docTitle.exists then -- /doc exists; link to it. local docLink = makeWikilink(docTitle.prefixedText) local editUrl = docTitle:fullUrl{action = 'edit'} local editDisplay = message('edit-link-display') local editLink = makeUrlLink(editUrl, editDisplay) local historyUrl = docTitle:fullUrl{action = 'history'} local historyDisplay = message('history-link-display') local historyLink = makeUrlLink(historyUrl, historyDisplay) ret = message('transcluded-from-blurb', {docLink}) .. ' ' .. makeToolbar(editLink, historyLink) .. '<br />' elseif env.subjectSpace == 828 then -- /doc does not exist; ask to create it. local createUrl = docTitle:fullUrl{action = 'edit', preload = message('module-preload')} local createDisplay = message('create-link-display') local createLink = makeUrlLink(createUrl, createDisplay) ret = message('create-module-doc-blurb', {createLink}) .. '<br />' end return ret end function p.makeExperimentBlurb(args, env) --[[ -- Renders the text "Editors can experiment in this template's sandbox (edit | diff) and testcases (edit) pages." -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'sandbox-link-display' --> 'sandbox' -- 'sandbox-edit-link-display' --> 'edit' -- 'compare-link-display' --> 'diff' -- 'module-sandbox-preload' --> 'Template:Documentation/preload-module-sandbox' -- 'template-sandbox-preload' --> 'Template:Documentation/preload-sandbox' -- 'sandbox-create-link-display' --> 'create' -- 'mirror-edit-summary' --> 'Create sandbox version of $1' -- 'mirror-link-display' --> 'mirror' -- 'mirror-link-preload' --> 'Template:Documentation/mirror' -- 'sandbox-link-display' --> 'sandbox' -- 'testcases-link-display' --> 'testcases' -- 'testcases-edit-link-display'--> 'edit' -- 'template-sandbox-preload' --> 'Template:Documentation/preload-sandbox' -- 'testcases-create-link-display' --> 'create' -- 'testcases-link-display' --> 'testcases' -- 'testcases-edit-link-display' --> 'edit' -- 'module-testcases-preload' --> 'Template:Documentation/preload-module-testcases' -- 'template-testcases-preload' --> 'Template:Documentation/preload-testcases' -- 'experiment-blurb-module' --> 'Editors can experiment in this module's $1 and $2 pages.' -- 'experiment-blurb-template' --> 'Editors can experiment in this template's $1 and $2 pages.' --]] local subjectSpace = env.subjectSpace local templateTitle = env.templateTitle local sandboxTitle = env.sandboxTitle local testcasesTitle = env.testcasesTitle local templatePage = templateTitle.prefixedText if not subjectSpace or not templateTitle or not sandboxTitle or not testcasesTitle then return nil end -- Make links. local sandboxLinks, testcasesLinks if sandboxTitle.exists then local sandboxPage = sandboxTitle.prefixedText local sandboxDisplay = message('sandbox-link-display') local sandboxLink = makeWikilink(sandboxPage, sandboxDisplay) local sandboxEditUrl = sandboxTitle:fullUrl{action = 'edit'} local sandboxEditDisplay = message('sandbox-edit-link-display') local sandboxEditLink = makeUrlLink(sandboxEditUrl, sandboxEditDisplay) local compareUrl = env.compareUrl local compareLink if compareUrl then local compareDisplay = message('compare-link-display') compareLink = makeUrlLink(compareUrl, compareDisplay) end sandboxLinks = sandboxLink .. ' ' .. makeToolbar(sandboxEditLink, compareLink) else local sandboxPreload if subjectSpace == 828 then sandboxPreload = message('module-sandbox-preload') else sandboxPreload = message('template-sandbox-preload') end local sandboxCreateUrl = sandboxTitle:fullUrl{action = 'edit', preload = sandboxPreload} local sandboxCreateDisplay = message('sandbox-create-link-display') local sandboxCreateLink = makeUrlLink(sandboxCreateUrl, sandboxCreateDisplay) local mirrorSummary = message('mirror-edit-summary', {makeWikilink(templatePage)}) local mirrorPreload = message('mirror-link-preload') local mirrorUrl = sandboxTitle:fullUrl{action = 'edit', preload = mirrorPreload, summary = mirrorSummary} local mirrorDisplay = message('mirror-link-display') local mirrorLink = makeUrlLink(mirrorUrl, mirrorDisplay) sandboxLinks = message('sandbox-link-display') .. ' ' .. makeToolbar(sandboxCreateLink, mirrorLink) end if testcasesTitle.exists then local testcasesPage = testcasesTitle.prefixedText local testcasesDisplay = message('testcases-link-display') local testcasesLink = makeWikilink(testcasesPage, testcasesDisplay) local testcasesEditUrl = testcasesTitle:fullUrl{action = 'edit'} local testcasesEditDisplay = message('testcases-edit-link-display') local testcasesEditLink = makeUrlLink(testcasesEditUrl, testcasesEditDisplay) testcasesLinks = testcasesLink .. ' ' .. makeToolbar(testcasesEditLink) else local testcasesPreload if subjectSpace == 828 then testcasesPreload = message('module-testcases-preload') else testcasesPreload = message('template-testcases-preload') end local testcasesCreateUrl = testcasesTitle:fullUrl{action = 'edit', preload = testcasesPreload} local testcasesCreateDisplay = message('testcases-create-link-display') local testcasesCreateLink = makeUrlLink(testcasesCreateUrl, testcasesCreateDisplay) testcasesLinks = message('testcases-link-display') .. ' ' .. makeToolbar(testcasesCreateLink) end local messageName if subjectSpace == 828 then messageName = 'experiment-blurb-module' else messageName = 'experiment-blurb-template' end return message(messageName, {sandboxLinks, testcasesLinks}) end function p.makeCategoriesBlurb(args, env) --[[ -- Generates the text "Please add categories to the /doc subpage." -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- Messages: -- 'doc-link-display' --> '/doc' -- 'add-categories-blurb' --> 'Please add categories to the $1 subpage.' --]] local docTitle = env.docTitle if not docTitle then return nil end local docPathLink = makeWikilink(docTitle.prefixedText, message('doc-link-display')) return message('add-categories-blurb', {docPathLink}) end function p.makeSubpagesBlurb(args, env) --[[ -- Generates the "Subpages of this template" link. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- Messages: -- 'template-pagetype' --> 'template' -- 'module-pagetype' --> 'module' -- 'default-pagetype' --> 'page' -- 'subpages-link-display' --> 'Subpages of this $1' --]] local subjectSpace = env.subjectSpace local templateTitle = env.templateTitle if not subjectSpace or not templateTitle then return nil end local pagetype if subjectSpace == 10 then pagetype = message('template-pagetype') elseif subjectSpace == 828 then pagetype = message('module-pagetype') else pagetype = message('default-pagetype') end local subpagesLink = makeWikilink( 'Special:PrefixIndex/' .. templateTitle.prefixedText .. '/', message('subpages-link-display', {pagetype}) ) return message('subpages-blurb', {subpagesLink}) end function p.makePrintBlurb(args, env) --[=[ -- Generates the blurb displayed when there is a print version of the template available. -- @args - a table of arguments passed by the user -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- -- Messages: -- 'print-link-display' --> '/Print' -- 'print-blurb' --> 'A [[Help:Books/for experts#Improving the book layout|print version]]' -- .. ' of this template exists at $1.' -- .. ' If you make a change to this template, please update the print version as well.' -- 'display-print-category' --> true -- 'print-category' --> 'Templates with print versions' --]=] local printTitle = env.printTitle if not printTitle then return nil end local ret if printTitle.exists then local printLink = makeWikilink(printTitle.prefixedText, message('print-link-display')) ret = message('print-blurb', {printLink}) local displayPrintCategory = message('display-print-category', nil, 'boolean') if displayPrintCategory then ret = ret .. makeCategoryLink(message('print-category')) end end return ret end ---------------------------------------------------------------------------- -- Tracking categories ---------------------------------------------------------------------------- function p.addTrackingCategories(env) --[[ -- Check if {{documentation}} is transcluded on a /doc or /testcases page. -- @env - environment table containing title objects, etc., generated with p.getEnvironment -- Messages: -- 'display-strange-usage-category' --> true -- 'doc-subpage' --> 'doc' -- 'testcases-subpage' --> 'testcases' -- 'strange-usage-category' --> 'Wikipedia pages with strange ((documentation)) usage' -- -- /testcases pages in the module namespace are not categorised, as they may have -- {{documentation}} transcluded automatically. --]] local title = env.title local subjectSpace = env.subjectSpace if not title or not subjectSpace then return nil end local subpage = title.subpageText local ret = '' if message('display-strange-usage-category', nil, 'boolean') and ( subpage == message('doc-subpage') or subjectSpace ~= 828 and subpage == message('testcases-subpage') ) then ret = ret .. makeCategoryLink(message('strange-usage-category')) end return ret end return p 5b80b9be06d84932df137c37d640ceb7ddd4fb62 Template:Documentation 10 84 222 2016-01-06T06:15:18Z Eddie 1 Created page with "{{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noi..." wikitext text/x-wiki {{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude> ce7fd93f18c46b4fa871bf679afd05cbda72d8c4 Module:Message box 0 85 223 2016-01-06T06:19:03Z Eddie 1 Created page with "-- This is a meta-module for producing message box templates, including -- {{mbox}}, {{ambox}}, {{imbox}}, {{tmbox}}, {{ombox}}, {{cmbox}} and {{fmbox}}. -- Load necessary mo..." wikitext text/x-wiki -- This is a meta-module for producing message box templates, including -- {{mbox}}, {{ambox}}, {{imbox}}, {{tmbox}}, {{ombox}}, {{cmbox}} and {{fmbox}}. -- Load necessary modules. require('Module:No globals') local getArgs local categoryHandler = require('Module:Category handler')._main local yesno = require('Module:Yesno') -- Get a language object for formatDate and ucfirst. local lang = mw.language.getContentLanguage() -------------------------------------------------------------------------------- -- Helper functions -------------------------------------------------------------------------------- local function getTitleObject(...) -- Get the title object, passing the function through pcall -- in case we are over the expensive function count limit. local success, title = pcall(mw.title.new, ...) if success then return title end end local function union(t1, t2) -- Returns the union of two arrays. local vals = {} for i, v in ipairs(t1) do vals[v] = true end for i, v in ipairs(t2) do vals[v] = true end local ret = {} for k in pairs(vals) do table.insert(ret, k) end table.sort(ret) return ret end local function getArgNums(args, prefix) local nums = {} for k, v in pairs(args) do local num = mw.ustring.match(tostring(k), '^' .. prefix .. '([1-9]%d*)$') if num then table.insert(nums, tonumber(num)) end end table.sort(nums) return nums end -------------------------------------------------------------------------------- -- Box class definition -------------------------------------------------------------------------------- local MessageBox = {} MessageBox.__index = MessageBox function MessageBox.new(boxType, args, cfg) args = args or {} local obj = {} -- Set the title object and the namespace. obj.title = getTitleObject(args.page) or mw.title.getCurrentTitle() -- Set the config for our box type. obj.cfg = cfg[boxType] if not obj.cfg then local ns = obj.title.namespace -- boxType is "mbox" or invalid input if ns == 0 then obj.cfg = cfg.ambox -- main namespace elseif ns == 6 then obj.cfg = cfg.imbox -- file namespace elseif ns == 14 then obj.cfg = cfg.cmbox -- category namespace else local nsTable = mw.site.namespaces[ns] if nsTable and nsTable.isTalk then obj.cfg = cfg.tmbox -- any talk namespace else obj.cfg = cfg.ombox -- other namespaces or invalid input end end end -- Set the arguments, and remove all blank arguments except for the ones -- listed in cfg.allowBlankParams. do local newArgs = {} for k, v in pairs(args) do if v ~= '' then newArgs[k] = v end end for i, param in ipairs(obj.cfg.allowBlankParams or {}) do newArgs[param] = args[param] end obj.args = newArgs end -- Define internal data structure. obj.categories = {} obj.classes = {} return setmetatable(obj, MessageBox) end function MessageBox:addCat(ns, cat, sort) if not cat then return nil end if sort then cat = string.format('[[Category:%s|%s]]', cat, sort) else cat = string.format('[[Category:%s]]', cat) end self.categories[ns] = self.categories[ns] or {} table.insert(self.categories[ns], cat) end function MessageBox:addClass(class) if not class then return nil end table.insert(self.classes, class) end function MessageBox:setParameters() local args = self.args local cfg = self.cfg -- Get type data. self.type = args.type local typeData = cfg.types[self.type] self.invalidTypeError = cfg.showInvalidTypeError and self.type and not typeData typeData = typeData or cfg.types[cfg.default] self.typeClass = typeData.class self.typeImage = typeData.image -- Find if the box has been wrongly substituted. self.isSubstituted = cfg.substCheck and args.subst == 'SUBST' -- Find whether we are using a small message box. self.isSmall = cfg.allowSmall and ( cfg.smallParam and args.small == cfg.smallParam or not cfg.smallParam and yesno(args.small) ) -- Add attributes, classes and styles. self.id = args.id self:addClass( cfg.usePlainlinksParam and yesno(args.plainlinks or true) and 'plainlinks' ) for _, class in ipairs(cfg.classes or {}) do self:addClass(class) end if self.isSmall then self:addClass(cfg.smallClass or 'mbox-small') end self:addClass(self.typeClass) self:addClass(args.class) self.style = args.style self.attrs = args.attrs -- Set text style. self.textstyle = args.textstyle -- Find if we are on the template page or not. This functionality is only -- used if useCollapsibleTextFields is set, or if both cfg.templateCategory -- and cfg.templateCategoryRequireName are set. self.useCollapsibleTextFields = cfg.useCollapsibleTextFields if self.useCollapsibleTextFields or cfg.templateCategory and cfg.templateCategoryRequireName then self.name = args.name if self.name then local templateName = mw.ustring.match( self.name, '^[tT][eE][mM][pP][lL][aA][tT][eE][%s_]*:[%s_]*(.*)$' ) or self.name templateName = 'Template:' .. templateName self.templateTitle = getTitleObject(templateName) end self.isTemplatePage = self.templateTitle and mw.title.equals(self.title, self.templateTitle) end -- Process data for collapsible text fields. At the moment these are only -- used in {{ambox}}. if self.useCollapsibleTextFields then -- Get the self.issue value. if self.isSmall and args.smalltext then self.issue = args.smalltext else local sect if args.sect == '' then sect = 'This ' .. (cfg.sectionDefault or 'page') elseif type(args.sect) == 'string' then sect = 'This ' .. args.sect end local issue = args.issue issue = type(issue) == 'string' and issue ~= '' and issue or nil local text = args.text text = type(text) == 'string' and text or nil local issues = {} table.insert(issues, sect) table.insert(issues, issue) table.insert(issues, text) self.issue = table.concat(issues, ' ') end -- Get the self.talk value. local talk = args.talk -- Show talk links on the template page or template subpages if the talk -- parameter is blank. if talk == '' and self.templateTitle and ( mw.title.equals(self.templateTitle, self.title) or self.title:isSubpageOf(self.templateTitle) ) then talk = '#' elseif talk == '' then talk = nil end if talk then -- If the talk value is a talk page, make a link to that page. Else -- assume that it's a section heading, and make a link to the talk -- page of the current page with that section heading. local talkTitle = getTitleObject(talk) local talkArgIsTalkPage = true if not talkTitle or not talkTitle.isTalkPage then talkArgIsTalkPage = false talkTitle = getTitleObject( self.title.text, mw.site.namespaces[self.title.namespace].talk.id ) end if talkTitle and talkTitle.exists then local talkText = 'Relevant discussion may be found on' if talkArgIsTalkPage then talkText = string.format( '%s [[%s|%s]].', talkText, talk, talkTitle.prefixedText ) else talkText = string.format( '%s the [[%s#%s|talk page]].', talkText, talkTitle.prefixedText, talk ) end self.talk = talkText end end -- Get other values. self.fix = args.fix ~= '' and args.fix or nil local date if args.date and args.date ~= '' then date = args.date elseif args.date == '' and self.isTemplatePage then date = lang:formatDate('F Y') end if date then self.date = string.format(" <small>''(%s)''</small>", date) end self.info = args.info end -- Set the non-collapsible text field. At the moment this is used by all box -- types other than ambox, and also by ambox when small=yes. if self.isSmall then self.text = args.smalltext or args.text else self.text = args.text end -- Set the below row. self.below = cfg.below and args.below -- General image settings. self.imageCellDiv = not self.isSmall and cfg.imageCellDiv self.imageEmptyCell = cfg.imageEmptyCell if cfg.imageEmptyCellStyle then self.imageEmptyCellStyle = 'border:none;padding:0px;width:1px' end -- Left image settings. local imageLeft = self.isSmall and args.smallimage or args.image if cfg.imageCheckBlank and imageLeft ~= 'blank' and imageLeft ~= 'none' or not cfg.imageCheckBlank and imageLeft ~= 'none' then self.imageLeft = imageLeft if not imageLeft then local imageSize = self.isSmall and (cfg.imageSmallSize or '30x30px') or '40x40px' self.imageLeft = string.format('[[File:%s|%s|link=|alt=]]', self.typeImage or 'Imbox notice.png', imageSize) end end -- Right image settings. local imageRight = self.isSmall and args.smallimageright or args.imageright if not (cfg.imageRightNone and imageRight == 'none') then self.imageRight = imageRight end end function MessageBox:setMainspaceCategories() local args = self.args local cfg = self.cfg if not cfg.allowMainspaceCategories then return nil end local nums = {} for _, prefix in ipairs{'cat', 'category', 'all'} do args[prefix .. '1'] = args[prefix] nums = union(nums, getArgNums(args, prefix)) end -- The following is roughly equivalent to the old {{Ambox/category}}. local date = args.date date = type(date) == 'string' and date local preposition = 'from' for _, num in ipairs(nums) do local mainCat = args['cat' .. tostring(num)] or args['category' .. tostring(num)] local allCat = args['all' .. tostring(num)] mainCat = type(mainCat) == 'string' and mainCat allCat = type(allCat) == 'string' and allCat if mainCat and date and date ~= '' then local catTitle = string.format('%s %s %s', mainCat, preposition, date) self:addCat(0, catTitle) catTitle = getTitleObject('Category:' .. catTitle) if not catTitle or not catTitle.exists then self:addCat(0, 'Articles with invalid date parameter in template') end elseif mainCat and (not date or date == '') then self:addCat(0, mainCat) end if allCat then self:addCat(0, allCat) end end end function MessageBox:setTemplateCategories() local args = self.args local cfg = self.cfg -- Add template categories. if cfg.templateCategory then if cfg.templateCategoryRequireName then if self.isTemplatePage then self:addCat(10, cfg.templateCategory) end elseif not self.title.isSubpage then self:addCat(10, cfg.templateCategory) end end -- Add template error categories. if cfg.templateErrorCategory then local templateErrorCategory = cfg.templateErrorCategory local templateCat, templateSort if not self.name and not self.title.isSubpage then templateCat = templateErrorCategory elseif self.isTemplatePage then local paramsToCheck = cfg.templateErrorParamsToCheck or {} local count = 0 for i, param in ipairs(paramsToCheck) do if not args[param] then count = count + 1 end end if count > 0 then templateCat = templateErrorCategory templateSort = tostring(count) end if self.categoryNums and #self.categoryNums > 0 then templateCat = templateErrorCategory templateSort = 'C' end end self:addCat(10, templateCat, templateSort) end end function MessageBox:setAllNamespaceCategories() -- Set categories for all namespaces. if self.invalidTypeError then local allSort = (self.title.namespace == 0 and 'Main:' or '') .. self.title.prefixedText self:addCat('all', 'Wikipedia message box parameter needs fixing', allSort) end if self.isSubstituted then self:addCat('all', 'Pages with incorrectly substituted templates') end end function MessageBox:setCategories() if self.title.namespace == 0 then self:setMainspaceCategories() elseif self.title.namespace == 10 then self:setTemplateCategories() end self:setAllNamespaceCategories() end function MessageBox:renderCategories() -- Convert category tables to strings and pass them through -- [[Module:Category handler]]. return categoryHandler{ main = table.concat(self.categories[0] or {}), template = table.concat(self.categories[10] or {}), all = table.concat(self.categories.all or {}), nocat = self.args.nocat, page = self.args.page } end function MessageBox:export() local root = mw.html.create() -- Add the subst check error. if self.isSubstituted and self.name then root:tag('b') :addClass('error') :wikitext(string.format( 'Template <code>%s[[Template:%s|%s]]%s</code> has been incorrectly substituted.', mw.text.nowiki('{{'), self.name, self.name, mw.text.nowiki('}}') )) end -- Create the box table. local boxTable = root:tag('table') boxTable:attr('id', self.id or nil) for i, class in ipairs(self.classes or {}) do boxTable:addClass(class or nil) end boxTable :cssText(self.style or nil) :attr('role', 'presentation') if self.attrs then boxTable:attr(self.attrs) end -- Add the left-hand image. local row = boxTable:tag('tr') if self.imageLeft then local imageLeftCell = row:tag('td'):addClass('mbox-image') if self.imageCellDiv then -- If we are using a div, redefine imageLeftCell so that the image -- is inside it. Divs use style="width: 52px;", which limits the -- image width to 52px. If any images in a div are wider than that, -- they may overlap with the text or cause other display problems. imageLeftCell = imageLeftCell:tag('div'):css('width', '52px') end imageLeftCell:wikitext(self.imageLeft or nil) elseif self.imageEmptyCell then -- Some message boxes define an empty cell if no image is specified, and -- some don't. The old template code in templates where empty cells are -- specified gives the following hint: "No image. Cell with some width -- or padding necessary for text cell to have 100% width." row:tag('td') :addClass('mbox-empty-cell') :cssText(self.imageEmptyCellStyle or nil) end -- Add the text. local textCell = row:tag('td'):addClass('mbox-text') if self.useCollapsibleTextFields then -- The message box uses advanced text parameters that allow things to be -- collapsible. At the moment, only ambox uses this. textCell:cssText(self.textstyle or nil) local textCellSpan = textCell:tag('span') textCellSpan :addClass('mbox-text-span') :wikitext(self.issue or nil) if not self.isSmall then textCellSpan:tag('span') :addClass('hide-when-compact') :wikitext(self.talk and (' ' .. self.talk) or nil) :wikitext(self.fix and (' ' .. self.fix) or nil) end textCellSpan:wikitext(self.date and (' ' .. self.date) or nil) if not self.isSmall then textCellSpan :tag('span') :addClass('hide-when-compact') :wikitext(self.info and (' ' .. self.info) or nil) end else -- Default text formatting - anything goes. textCell :cssText(self.textstyle or nil) :wikitext(self.text or nil) end -- Add the right-hand image. if self.imageRight then local imageRightCell = row:tag('td'):addClass('mbox-imageright') if self.imageCellDiv then -- If we are using a div, redefine imageRightCell so that the image -- is inside it. imageRightCell = imageRightCell:tag('div'):css('width', '52px') end imageRightCell :wikitext(self.imageRight or nil) end -- Add the below row. if self.below then boxTable:tag('tr') :tag('td') :attr('colspan', self.imageRight and '3' or '2') :addClass('mbox-text') :cssText(self.textstyle or nil) :wikitext(self.below or nil) end -- Add error message for invalid type parameters. if self.invalidTypeError then root:tag('div') :css('text-align', 'center') :wikitext(string.format( 'This message box is using an invalid "type=%s" parameter and needs fixing.', self.type or '' )) end -- Add categories. root:wikitext(self:renderCategories() or nil) return tostring(root) end -------------------------------------------------------------------------------- -- Exports -------------------------------------------------------------------------------- local p, mt = {}, {} function p._exportClasses() -- For testing. return { MessageBox = MessageBox } end function p.main(boxType, args, cfgTables) local box = MessageBox.new(boxType, args, cfgTables or mw.loadData('Module:Message box/configuration')) box:setParameters() box:setCategories() return box:export() end function mt.__index(t, k) return function (frame) if not getArgs then getArgs = require('Module:Arguments').getArgs end return t.main(k, getArgs(frame, {trim = false, removeBlanks = false})) end end return setmetatable(p, mt) 0e1b08d466f6c7979b1f95f3ad403fbd4998209c Module:Documentation/config 0 86 224 2016-01-06T06:25:35Z Eddie 1 Created page with "---------------------------------------------------------------------------------------------------- -- -- Configuration for Module:Documentation..." wikitext text/x-wiki ---------------------------------------------------------------------------------------------------- -- -- Configuration for Module:Documentation -- -- Here you can set the values of the parameters and messages used in Module:Documentation to -- localise it to your wiki and your language. Unless specified otherwise, values given here -- should be string values. ---------------------------------------------------------------------------------------------------- local cfg = {} -- Do not edit this line. ---------------------------------------------------------------------------------------------------- -- Protection template configuration ---------------------------------------------------------------------------------------------------- -- cfg['protection-template'] -- The name of the template that displays the protection icon (a padlock on enwiki). cfg['protection-template'] = 'pp-template' -- cfg['protection-reason-edit'] -- The protection reason for edit-protected templates to pass to -- [[Module:Protection banner]]. cfg['protection-reason-edit'] = 'template' --[[ -- cfg['protection-template-args'] -- Any arguments to send to the protection template. This should be a Lua table. -- For example, if the protection template is "pp-template", and the wikitext template invocation -- looks like "{{pp-template|docusage=yes}}", then this table should look like "{docusage = 'yes'}". --]] cfg['protection-template-args'] = {docusage = 'yes'} --[[ ---------------------------------------------------------------------------------------------------- -- Sandbox notice configuration -- -- On sandbox pages the module can display a template notifying users that the current page is a -- sandbox, and the location of test cases pages, etc. The module decides whether the page is a -- sandbox or not based on the value of cfg['sandbox-subpage']. The following settings configure the -- messages that the notices contains. ---------------------------------------------------------------------------------------------------- --]] -- cfg['sandbox-notice-image'] -- The image displayed in the sandbox notice. cfg['sandbox-notice-image'] = '[[Image:Sandbox.svg|50px|alt=|link=]]' --[[ -- cfg['sandbox-notice-pagetype-template'] -- cfg['sandbox-notice-pagetype-module'] -- cfg['sandbox-notice-pagetype-other'] -- The page type of the sandbox page. The message that is displayed depends on the current subject -- namespace. This message is used in either cfg['sandbox-notice-blurb'] or -- cfg['sandbox-notice-diff-blurb']. --]] cfg['sandbox-notice-pagetype-template'] = '[[Wikipedia:Template test cases|template sandbox]] page' cfg['sandbox-notice-pagetype-module'] = '[[Wikipedia:Template test cases|module sandbox]] page' cfg['sandbox-notice-pagetype-other'] = 'sandbox page' --[[ -- cfg['sandbox-notice-blurb'] -- cfg['sandbox-notice-diff-blurb'] -- cfg['sandbox-notice-diff-display'] -- Either cfg['sandbox-notice-blurb'] or cfg['sandbox-notice-diff-blurb'] is the opening sentence -- of the sandbox notice. The latter has a diff link, but the former does not. $1 is the page -- type, which is either cfg['sandbox-notice-pagetype-template'], -- cfg['sandbox-notice-pagetype-module'] or cfg['sandbox-notice-pagetype-other'] depending what -- namespace we are in. $2 is a link to the main template page, and $3 is a diff link between -- the sandbox and the main template. The display value of the diff link is set by -- cfg['sandbox-notice-compare-link-display']. --]] cfg['sandbox-notice-blurb'] = 'This is the $1 for $2.' cfg['sandbox-notice-diff-blurb'] = 'This is the $1 for $2 ($3).' cfg['sandbox-notice-compare-link-display'] = 'diff' --[[ -- cfg['sandbox-notice-testcases-blurb'] -- cfg['sandbox-notice-testcases-link-display'] -- cfg['sandbox-notice-testcases-run-blurb'] -- cfg['sandbox-notice-testcases-run-link-display'] -- cfg['sandbox-notice-testcases-blurb'] is a sentence notifying the user that there is a test cases page -- corresponding to this sandbox that they can edit. $1 is a link to the test cases page. -- cfg['sandbox-notice-testcases-link-display'] is the display value for that link. -- cfg['sandbox-notice-testcases-run-blurb'] is a sentence notifying the user that there is a test cases page -- corresponding to this sandbox that they can edit, along with a link to run it. $1 is a link to the test -- cases page, and $2 is a link to the page to run it. -- cfg['sandbox-notice-testcases-run-link-display'] is the display value for the link to run the test -- cases. --]] cfg['sandbox-notice-testcases-blurb'] = 'See also the companion subpage for $1.' cfg['sandbox-notice-testcases-link-display'] = 'test cases' cfg['sandbox-notice-testcases-run-blurb'] = 'See also the companion subpage for $1 ($2).' cfg['sandbox-notice-testcases-run-link-display'] = 'run' -- cfg['sandbox-category'] -- A category to add to all template sandboxes. cfg['sandbox-category'] = 'Template sandboxes' ---------------------------------------------------------------------------------------------------- -- Start box configuration ---------------------------------------------------------------------------------------------------- -- cfg['documentation-icon-wikitext'] -- The wikitext for the icon shown at the top of the template. cfg['documentation-icon-wikitext'] = '[[File:Test Template Info-Icon - Version (2).svg|50px|link=|alt=Documentation icon]]' -- cfg['template-namespace-heading'] -- The heading shown in the template namespace. cfg['template-namespace-heading'] = 'Template documentation' -- cfg['module-namespace-heading'] -- The heading shown in the module namespace. cfg['module-namespace-heading'] = 'Module documentation' -- cfg['file-namespace-heading'] -- The heading shown in the file namespace. cfg['file-namespace-heading'] = 'Summary' -- cfg['other-namespaces-heading'] -- The heading shown in other namespaces. cfg['other-namespaces-heading'] = 'Documentation' -- cfg['view-link-display'] -- The text to display for "view" links. cfg['view-link-display'] = 'view' -- cfg['edit-link-display'] -- The text to display for "edit" links. cfg['edit-link-display'] = 'edit' -- cfg['history-link-display'] -- The text to display for "history" links. cfg['history-link-display'] = 'history' -- cfg['purge-link-display'] -- The text to display for "purge" links. cfg['purge-link-display'] = 'purge' -- cfg['create-link-display'] -- The text to display for "create" links. cfg['create-link-display'] = 'create' ---------------------------------------------------------------------------------------------------- -- Link box (end box) configuration ---------------------------------------------------------------------------------------------------- -- cfg['transcluded-from-blurb'] -- Notice displayed when the docs are transcluded from another page. $1 is a wikilink to that page. cfg['transcluded-from-blurb'] = 'The above [[Wikipedia:Template documentation|documentation]] is [[Wikipedia:Transclusion|transcluded]] from $1.' --[[ -- cfg['create-module-doc-blurb'] -- Notice displayed in the module namespace when the documentation subpage does not exist. -- $1 is a link to create the documentation page with the preload cfg['module-preload'] and the -- display cfg['create-link-display']. --]] cfg['create-module-doc-blurb'] = 'You might want to $1 a documentation page for this [[Wikipedia:Lua|Scribunto module]].' ---------------------------------------------------------------------------------------------------- -- Experiment blurb configuration ---------------------------------------------------------------------------------------------------- --[[ -- cfg['experiment-blurb-template'] -- cfg['experiment-blurb-module'] -- The experiment blurb is the text inviting editors to experiment in sandbox and test cases pages. -- It is only shown in the template and module namespaces. With the default English settings, it -- might look like this: -- -- Editors can experiment in this template's sandbox (edit | diff) and testcases (edit) pages. -- -- In this example, "sandbox", "edit", "diff", "testcases", and "edit" would all be links. -- -- There are two versions, cfg['experiment-blurb-template'] and cfg['experiment-blurb-module'], depending -- on what namespace we are in. -- -- Parameters: -- -- $1 is a link to the sandbox page. If the sandbox exists, it is in the following format: -- -- cfg['sandbox-link-display'] (cfg['sandbox-edit-link-display'] | cfg['compare-link-display']) -- -- If the sandbox doesn't exist, it is in the format: -- -- cfg['sandbox-link-display'] (cfg['sandbox-create-link-display'] | cfg['mirror-link-display']) -- -- The link for cfg['sandbox-create-link-display'] link preloads the page with cfg['template-sandbox-preload'] -- or cfg['module-sandbox-preload'], depending on the current namespace. The link for cfg['mirror-link-display'] -- loads a default edit summary of cfg['mirror-edit-summary']. -- -- $2 is a link to the test cases page. If the test cases page exists, it is in the following format: -- -- cfg['testcases-link-display'] (cfg['testcases-edit-link-display']) -- -- If the test cases page doesn't exist, it is in the format: -- -- cfg['testcases-link-display'] (cfg['testcases-create-link-display']) -- -- If the test cases page doesn't exist, the link for cfg['testcases-create-link-display'] preloads the -- page with cfg['template-testcases-preload'] or cfg['module-testcases-preload'], depending on the current -- namespace. --]] cfg['experiment-blurb-template'] = "Editors can experiment in this template's $1 and $2 pages." cfg['experiment-blurb-module'] = "Editors can experiment in this module's $1 and $2 pages." ---------------------------------------------------------------------------------------------------- -- Sandbox link configuration ---------------------------------------------------------------------------------------------------- -- cfg['sandbox-subpage'] -- The name of the template subpage typically used for sandboxes. cfg['sandbox-subpage'] = 'sandbox' -- cfg['template-sandbox-preload'] -- Preload file for template sandbox pages. cfg['template-sandbox-preload'] = 'Template:Documentation/preload-sandbox' -- cfg['module-sandbox-preload'] -- Preload file for Lua module sandbox pages. cfg['module-sandbox-preload'] = 'Template:Documentation/preload-module-sandbox' -- cfg['sandbox-link-display'] -- The text to display for "sandbox" links. cfg['sandbox-link-display'] = 'sandbox' -- cfg['sandbox-edit-link-display'] -- The text to display for sandbox "edit" links. cfg['sandbox-edit-link-display'] = 'edit' -- cfg['sandbox-create-link-display'] -- The text to display for sandbox "create" links. cfg['sandbox-create-link-display'] = 'create' -- cfg['compare-link-display'] -- The text to display for "compare" links. cfg['compare-link-display'] = 'diff' -- cfg['mirror-edit-summary'] -- The default edit summary to use when a user clicks the "mirror" link. $1 is a wikilink to the -- template page. cfg['mirror-edit-summary'] = 'Create sandbox version of $1' -- cfg['mirror-link-display'] -- The text to display for "mirror" links. cfg['mirror-link-display'] = 'mirror' -- cfg['mirror-link-preload'] -- The page to preload when a user clicks the "mirror" link. cfg['mirror-link-preload'] = 'Template:Documentation/mirror' ---------------------------------------------------------------------------------------------------- -- Test cases link configuration ---------------------------------------------------------------------------------------------------- -- cfg['testcases-subpage'] -- The name of the template subpage typically used for test cases. cfg['testcases-subpage'] = 'testcases' -- cfg['template-testcases-preload'] -- Preload file for template test cases pages. cfg['template-testcases-preload'] = 'Template:Documentation/preload-testcases' -- cfg['module-testcases-preload'] -- Preload file for Lua module test cases pages. cfg['module-testcases-preload'] = 'Template:Documentation/preload-module-testcases' -- cfg['testcases-link-display'] -- The text to display for "testcases" links. cfg['testcases-link-display'] = 'testcases' -- cfg['testcases-edit-link-display'] -- The text to display for test cases "edit" links. cfg['testcases-edit-link-display'] = 'edit' -- cfg['testcases-create-link-display'] -- The text to display for test cases "create" links. cfg['testcases-create-link-display'] = 'create' ---------------------------------------------------------------------------------------------------- -- Add categories blurb configuration ---------------------------------------------------------------------------------------------------- --[[ -- cfg['add-categories-blurb'] -- Text to direct users to add categories to the /doc subpage. Not used if the "content" or -- "docname fed" arguments are set, as then it is not clear where to add the categories. $1 is a -- link to the /doc subpage with a display value of cfg['doc-link-display']. --]] cfg['add-categories-blurb'] = 'Please add categories to the $1 subpage.' -- cfg['doc-link-display'] -- The text to display when linking to the /doc subpage. cfg['doc-link-display'] = '/doc' ---------------------------------------------------------------------------------------------------- -- Subpages link configuration ---------------------------------------------------------------------------------------------------- --[[ -- cfg['subpages-blurb'] -- The "Subpages of this template" blurb. $1 is a link to the main template's subpages with a -- display value of cfg['subpages-link-display']. In the English version this blurb is simply -- the link followed by a period, and the link display provides the actual text. --]] cfg['subpages-blurb'] = '$1.' --[[ -- cfg['subpages-link-display'] -- The text to display for the "subpages of this page" link. $1 is cfg['template-pagetype'], -- cfg['module-pagetype'] or cfg['default-pagetype'], depending on whether the current page is in -- the template namespace, the module namespace, or another namespace. --]] cfg['subpages-link-display'] = 'Subpages of this $1' -- cfg['template-pagetype'] -- The pagetype to display for template pages. cfg['template-pagetype'] = 'template' -- cfg['module-pagetype'] -- The pagetype to display for Lua module pages. cfg['module-pagetype'] = 'module' -- cfg['default-pagetype'] -- The pagetype to display for pages other than templates or Lua modules. cfg['default-pagetype'] = 'page' ---------------------------------------------------------------------------------------------------- -- Doc link configuration ---------------------------------------------------------------------------------------------------- -- cfg['doc-subpage'] -- The name of the subpage typically used for documentation pages. cfg['doc-subpage'] = 'doc' -- cfg['file-docpage-preload'] -- Preload file for documentation page in the file namespace. cfg['file-docpage-preload'] = 'Template:Documentation/preload-filespace' -- cfg['docpage-preload'] -- Preload file for template documentation pages in all namespaces. cfg['docpage-preload'] = 'Template:Documentation/preload' -- cfg['module-preload'] -- Preload file for Lua module documentation pages. cfg['module-preload'] = 'Template:Documentation/preload-module-doc' ---------------------------------------------------------------------------------------------------- -- Print version configuration ---------------------------------------------------------------------------------------------------- -- cfg['print-subpage'] -- The name of the template subpage used for print versions. cfg['print-subpage'] = 'Print' -- cfg['print-link-display'] -- The text to display when linking to the /Print subpage. cfg['print-link-display'] = '/Print' -- cfg['print-blurb'] -- Text to display if a /Print subpage exists. $1 is a link to the subpage with a display value of cfg['print-link-display']. cfg['print-blurb'] = 'A [[Help:Books/for experts#Improving the book layout|print version]] of this template exists at $1.' .. ' If you make a change to this template, please update the print version as well.' -- cfg['display-print-category'] -- Set to true to enable output of cfg['print-category'] if a /Print subpage exists. -- This should be a boolean value (either true or false). cfg['display-print-category'] = true -- cfg['print-category'] -- Category to output if cfg['display-print-category'] is set to true, and a /Print subpage exists. cfg['print-category'] = 'Templates with print versions' ---------------------------------------------------------------------------------------------------- -- HTML and CSS configuration ---------------------------------------------------------------------------------------------------- -- cfg['main-div-id'] -- The "id" attribute of the main HTML "div" tag. cfg['main-div-id'] = 'template-documentation' -- cfg['main-div-classes'] -- The CSS classes added to the main HTML "div" tag. cfg['main-div-classes'] = 'template-documentation iezoomfix' -- cfg['start-box-linkclasses'] -- The CSS classes used for the [view][edit][history] or [create] links in the start box. cfg['start-box-linkclasses'] = 'mw-editsection-like plainlinks' -- cfg['start-box-link-id'] -- The HTML "id" attribute for the links in the start box. cfg['start-box-link-id'] = 'doc_editlinks' ---------------------------------------------------------------------------------------------------- -- {{fmbox}} template configuration ---------------------------------------------------------------------------------------------------- -- cfg['fmbox-id'] -- The id sent to the "id" parameter of the {{fmbox}} template. cfg['fmbox-id'] = 'documentation-meta-data' -- cfg['fmbox-style'] -- The value sent to the style parameter of {{fmbox}}. cfg['fmbox-style'] = 'background-color: #ecfcf4' -- cfg['fmbox-textstyle'] -- The value sent to the "textstyle parameter of {{fmbox}}. cfg['fmbox-textstyle'] = 'font-style: italic' ---------------------------------------------------------------------------------------------------- -- Tracking category configuration ---------------------------------------------------------------------------------------------------- -- cfg['display-strange-usage-category'] -- Set to true to enable output of cfg['strange-usage-category'] if the module is used on a /doc subpage -- or a /testcases subpage. This should be a boolean value (either true or false). cfg['display-strange-usage-category'] = true -- cfg['strange-usage-category'] -- Category to output if cfg['display-strange-usage-category'] is set to true and the module is used on a -- /doc subpage or a /testcases subpage. cfg['strange-usage-category'] = 'Wikipedia pages with strange ((documentation)) usage' --[[ ---------------------------------------------------------------------------------------------------- -- End configuration -- -- Don't edit anything below this line. ---------------------------------------------------------------------------------------------------- --]] return cfg 39bcf8bd16bb48d808a82e405d7bc45608ba8ef7 Module:Yesno 0 87 225 2016-01-06T06:27:48Z Eddie 1 Created page with "-- Function allowing for consistent treatment of boolean-like wikitext input. -- It works similarly to the template {{yesno}}. return function (val, default) -- If your wiki..." wikitext text/x-wiki -- Function allowing for consistent treatment of boolean-like wikitext input. -- It works similarly to the template {{yesno}}. return function (val, default) -- If your wiki uses non-ascii characters for any of "yes", "no", etc., you -- should replace "val:lower()" with "mw.ustring.lower(val)" in the -- following line. val = type(val) == 'string' and val:lower() or val if val == nil then return nil elseif val == true or val == 'yes' or val == 'y' or val == 'true' or val == 't' or tonumber(val) == 1 then return true elseif val == false or val == 'no' or val == 'n' or val == 'false' or val == 'f' or tonumber(val) == 0 then return false else return default end end 12981c9a31eb2b0af1be4f16fc0642e180eac8c2 Template:Gitblit 10 88 226 2016-01-06T06:31:18Z Eddie 1 Created page with "{{Git repo |project={{{3|mediawiki/extensions/}}}{{{1|}}} |text={{{2|{{{1}}}}}}}}<noinclude> {{doc}} </noinclude>" wikitext text/x-wiki {{Git repo |project={{{3|mediawiki/extensions/}}}{{{1|}}} |text={{{2|{{{1}}}}}}}}<noinclude> {{doc}} </noinclude> 0b3740435275fd4e817a874bd7b77235822e64da Template:Doc 10 89 227 2016-01-06T06:32:18Z Eddie 1 Created page with "<noinclude>{{Documentation subpage}} {{timw|{{BASEPAGENAME}}}} </noinclude> ''Deprecated, use {{tl|git repo}} instead.'' Generates a link to a repository's summary page. This..." wikitext text/x-wiki <noinclude>{{Documentation subpage}} {{timw|{{BASEPAGENAME}}}} </noinclude> ''Deprecated, use {{tl|git repo}} instead.'' Generates a link to a repository's summary page. This invokes {{tl|Git repo}} with logic to just provide an extension name instead. We are deprecating Gitblit at git.wikimedia.org in favor of [[Diffusion]] ([[phab:T108864]]), so this template's name is misleading. ==Usage== ;Params: * $1: extension or repository name, defaults to empty string. ''no leading whitespace'' * $2: link text, defaults to $1 * $3: path to the repo including trailing /, defaults to mediawiki/extensions/ ==Example== {{tlx|Gitblit|examples}} : generates {{Gitblit|examples}} <!-- tlx *GARBLES and OMITS* the deliberately missing 2nd parameter, so insert space! --> {{tlx|gitblit|browsertests|&nbsp;|qa/}} : generates {{gitblit|browsertests| |qa/}} {{tlx|gitblit|browsertests|Our browsertests repository|qa/}} : generates {{gitblit|browsertests|Our browsertests repository|qa/}} <includeonly> <!-- PUT HERE THE CATEGORIES OF THE TEMPLATE --> [[Category:Extension templates{{translation}}]] {{Category|External link templates}} [[Category:Git]] </includeonly> ae371cddb9056df1f3f06546e9979f992008a52e Template:Git repo 10 90 228 2016-01-06T06:32:59Z Eddie 1 Created page with "[https://phabricator.wikimedia.org/diffusion/{{#invoke:callsigns|repoToCallsign|{{{project|mediawiki/core}}}}}/ {{#if:{{{text|}}} |{{{text}}} |{{{project|MW core}}} }}]<no..." wikitext text/x-wiki [https://phabricator.wikimedia.org/diffusion/{{#invoke:callsigns|repoToCallsign|{{{project|mediawiki/core}}}}}/ {{#if:{{{text|}}} |{{{text}}} |{{{project|MW core}}} }}]<noinclude> {{draft}} {{doc}} </noinclude> 57544e2c2a10bd4e771081d9355d17acb8c0de9a Template:Tlx 10 91 229 2016-01-06T06:33:47Z Eddie 1 Created page with "{{[[{{#if:{{{SISTER|}}}|{{{SISTER}}}Template|{{ns:Template}}}}:{{{1|Tlx}}}|{{{1|Tlx}}}]]<!-- -->{{#if:{{{2|}}}|&#124;{{{2}}}}}<!-- -->{{#if:{{{3|}}}|&#124;{{{3}}}}}<!-- -->{{#..." wikitext text/x-wiki {{[[{{#if:{{{SISTER|}}}|{{{SISTER}}}Template|{{ns:Template}}}}:{{{1|Tlx}}}|{{{1|Tlx}}}]]<!-- -->{{#if:{{{2|}}}|&#124;{{{2}}}}}<!-- -->{{#if:{{{3|}}}|&#124;{{{3}}}}}<!-- -->{{#if:{{{4|}}}|&#124;{{{4}}}}}<!-- -->{{#if:{{{5|}}}|&#124;{{{5}}}}}<!-- -->{{#if:{{{6|}}}|&#124;{{{6}}}}}<!-- -->{{#if:{{{7|}}}|&#124;{{{7}}}}}<!-- -->{{#if:{{{8|}}}|&#124;''...''}}}}<noinclude> {{documentation}} </noinclude> 31fa8846f3adf381b3a4943183ffd00c2489a2ff Diffusion 0 92 230 2016-01-06T06:35:28Z Eddie 1 Created page with ""Diffusion" is the Phabricator repository browser[1] and repository management tool. Diffusion is integrated with the other tools in the Phabricator suite. For instance: Whe..." wikitext text/x-wiki "Diffusion" is the Phabricator repository browser[1] and repository management tool. Diffusion is integrated with the other tools in the Phabricator suite. For instance: When you commit Differential revisions to a tracked repository, they are automatically updated and linked to the corresponding commits; You can add Herald rules to notify you about commits that match certain rules; In tasks and other places, you can automatically link to commits. Creating and managing repositories The #Repository-Admins group in Phabricator is tasked with creating, managing and organizing our repositories. If you need help with a repo, these are the folks to ask. Requesting a new repository If you would like to have a new repository created and/or imported into Diffusion, please create a task in the #Repository-Admins project. Please include the following information: The desired callsign (following the naming conventions), eg: rECNO The desired full name, eg: extension-CentralNotice If needed, the url to another git repo that you would like the new repository to be populated with initially Callsigns Callsigns are short names that represent a repository. You can read more about them in the upstream Phabricator documentation. Callsigns must be only capital Latin alphabet letters (eg: [A-Z]+). They are also immutable (not changeable). Callsign templates Module:Callsigns maps repository "paths" in gerrit to Diffusion callsigns, for example "mediawiki/extensions/AbuseFilter" maps to the callsign EABF. {{git file}} takes a project=path/to/repo parameter to refer to a git repository (phab:T101358), so it invokes Module:Callsigns to create a link to a file in diffusion. FYI - Email address privacy Obviously, if you make a commit using an email address that is associated with a Phabricator user, the user and the email address will be linked in the user interface. References ↑ Upstream documentation on Diffusion: https://secure.phabricator.com/book/phabricator/article/diffusion/ aa34ab63140340d9c519c107ca33a23da7d8ac47 Template:Git file 10 93 231 2016-01-06T06:37:04Z Eddie 1 Created page with "[https://phabricator.wikimedia.org/diffusion/{{#invoke:callsigns|repoToCallsign|{{{project|mediawiki/core}}}}}/{{#switch:{{{action|}}} |raw|tree|blame|browse=browse |#defa..." wikitext text/x-wiki [https://phabricator.wikimedia.org/diffusion/{{#invoke:callsigns|repoToCallsign|{{{project|mediawiki/core}}}}}/{{#switch:{{{action|}}} |raw|tree|blame|browse=browse |#default= {{{action|browse}}} }}/{{#if:{{{branch|}}} |{{#ifeq:{{{branch|}}}|HEAD|master|{{{branch}}}}} |master }}/{{{file|}}}{{#if:{{{line|}}} |${{{line}}} }}{{#ifeq:{{{action|}}}|raw |?view=raw | }}{{#ifeq:{{{action|}}}|blame |?blame=1 | }} {{#if:{{{text|}}} |{{{text}}} |{{{file}}} }}]<!-- -->{{#ifeq:{{{action|}}}|blob_plain |<span style="display:none">[[Template:Git file/blob_plain]]</span>}}<!-- -->{{#ifeq:{{{action|}}}|shortlog |<span style="display:none">[[Template:Git file/shortlog]]</span>}}<noinclude> {{doc}} <small>Maintenance: [[Special:WhatLinksHere/Template:Git file/blob_plain|blob_plain]], [[Special:WhatLinksHere/Template:Git file/shortlog|shortlog]], [[Module:Callsigns]]</small> {{Category|External link templates}} </noinclude> b0dd60785ecfc4c10e0eb44572e4c4715689faf3 Module:Callsigns 0 94 232 2016-01-06T06:38:47Z Eddie 1 Created page with "["mediawiki/extensions/AJAXPoll"] = "EAJP"; ["mediawiki/extensions/APC"] = "EAPC"; ["mediawiki/extensions/CirrusSearch"] = "ECIR"; ["mediawiki/extensions/SphinxSearch"] = "ESP..." wikitext text/x-wiki ["mediawiki/extensions/AJAXPoll"] = "EAJP"; ["mediawiki/extensions/APC"] = "EAPC"; ["mediawiki/extensions/CirrusSearch"] = "ECIR"; ["mediawiki/extensions/SphinxSearch"] = "ESPH"; ["mediawiki/extensions/AWS"] = "EAWS"; ["mediawiki/extensions/AWSSDK"] = "EAWK"; ["mediawiki/extensions/AbsenteeLandlord"] = "EABL"; ["mediawiki/extensions/AbuseFilter"] = "EABF"; ["mediawiki/extensions/AccessControl"] = "EACC"; ["mediawiki/extensions/AccountAudit"] = "EAAU"; ["mediawiki/extensions/AccountInfo"] = "EAIN"; ["mediawiki/extensions/ActionEditSubmit"] = "EAES"; ["mediawiki/extensions/ActiveAbstract"] = "EAAB"; ["mediawiki/extensions/ActivityMonitor"] = "EACM"; ["mediawiki/extensions/AdManager"] = "EADM"; ["mediawiki/extensions/AddMessages"] = "EAMS"; ["mediawiki/extensions/AddThis"] = "EADT"; ["mediawiki/extensions/AdminLinks"] = "EADL"; ["mediawiki/extensions/Ads"] = "EADS"; ["mediawiki/extensions/AdvancedMeta"] = "EAME"; ["mediawiki/extensions/Agora"] = "EAGO"; ["mediawiki/extensions/AjaxLogin"] = "EAJL"; ["mediawiki/extensions/AkismetKlik"] = "EAKI"; ["mediawiki/extensions/AllTimeZones"] = "EATZ"; ["mediawiki/extensions/AnchorHandler"] = "EAHA"; ["mediawiki/extensions/Annotator"] = "EANN"; ["mediawiki/extensions/AntiBot"] = "EANB"; ["mediawiki/extensions/AntiSpoof"] = "EANS"; ["mediawiki/extensions/ApiExplorer"] = "EAPX"; ["mediawiki/extensions/ApiSVGProxy"] = "EASP"; ["mediawiki/extensions/ApiSandbox"] = "ESBX"; ["mediawiki/extensions/ApprovedRevs"] = "EARE"; ["mediawiki/extensions/Arrays"] = "EARR"; ["mediawiki/extensions/ArticleCreationWorkflow"] = "EACW"; ["mediawiki/extensions/ArticleFeedback"] = "EAFB"; ["mediawiki/extensions/ArticleFeedbackv5"] = "EAFF"; ["mediawiki/extensions/ArticleIndex"] = "EAID"; ["mediawiki/extensions/AssertEdit"] = "EASE"; ["mediawiki/extensions/Auth_remoteuser"] = "EARU"; ["mediawiki/extensions/AuthorProtect"] = "EAUP"; ["mediawiki/extensions/AutoCreateCategoryPages"] = "EACP"; ["mediawiki/extensions/AutoProxyBlock"] = "EAPB"; ["mediawiki/extensions/AutomaticBoardWelcome"] = "EABW"; ["mediawiki/extensions/Awesomeness"] = "EAWE"; ["mediawiki/extensions/AzharAuth"] = "EAZA"; ["mediawiki/extensions/Babel"] = "EBAB"; ["mediawiki/extensions/BatchUserRights"] = "EBUR"; ["mediawiki/extensions/BayesianFilter"] = "EBAF"; ["mediawiki/extensions/BetaFeatures"] = "EBET"; ["mediawiki/extensions/BibManager"] = "EBIB"; ["mediawiki/extensions/BiblioPlus"] = "EBPL"; ["mediawiki/extensions/Blackout"] = "EBLA"; ["mediawiki/extensions/BlameMaps"] = "EBLM"; ["mediawiki/extensions/BlockAndNuke"] = "EBAN"; ["mediawiki/extensions/BlogPage"] = "EBLO"; ["mediawiki/extensions/BlueSpiceExtensions"] = "EBSE"; ["mediawiki/extensions/BlueSpiceFoundation"] = "EBSF"; ["mediawiki/extensions/BookManager"] = "EBMA"; ["mediawiki/extensions/BookManagerv2"] = "EBMB"; ["mediawiki/extensions/Bootstrap"] = "EBOO"; ["mediawiki/extensions/BounceHandler"] = "EBHA"; ["mediawiki/extensions/BreadCrumbs"] = "EBCR"; ["mediawiki/extensions/BreadCrumbs2"] = "EBCS"; ["mediawiki/extensions/CSS"] = "ECSS"; ["mediawiki/extensions/Calendar"] = "ECAL"; ["mediawiki/extensions/Campaigns"] = "ECAM"; ["mediawiki/extensions/Capiunto"] = "ECAP"; ["mediawiki/extensions/Carp"] = "ECAR"; ["mediawiki/extensions/CategorySlideShow"] = "ECAS"; ["mediawiki/extensions/CategorySortHeaders"] = "ECSH"; ["mediawiki/extensions/CategoryTagSorter"] = "ECTS"; ["mediawiki/extensions/CategoryTests"] = "ECTE"; ["mediawiki/extensions/CategoryTree"] = "ECTR"; ["mediawiki/extensions/CentralAuth"] = "ECAU"; ["mediawiki/extensions/CentralLogging"] = "ECLO"; ["mediawiki/extensions/CentralNotice"] = "ECNO"; ["mediawiki/extensions/CentralNotice-BannerProxy"] = "ECNB"; ["mediawiki/extensions/Challenge"] = "ECHA"; ["mediawiki/extensions/CharInsert"] = "ECHI"; ["mediawiki/extensions/CharRangeSpan"] = "ECRS"; ["mediawiki/extensions/CheckUser"] = "ECHU"; ["mediawiki/extensions/Checkpoint"] = "ECHE"; ["mediawiki/extensions/Cite"] = "ECIT"; ["mediawiki/extensions/CiteThisPage"] = "ECTP"; ["mediawiki/extensions/Citoid"] = "ECEX"; ["mediawiki/extensions/CleanChanges"] = "ECLC"; ["mediawiki/extensions/ClickTracking"] = "ECLT"; ["mediawiki/extensions/ClientSide"] = "ECLS"; ["mediawiki/extensions/CloseWikis"] = "ECLW"; ["mediawiki/extensions/CodeEditor"] = "ECED"; ["mediawiki/extensions/CodeMirror"] = "ECMI"; ["mediawiki/extensions/CodeReview"] = "ECRE"; ["mediawiki/extensions/Collection"] = "ECOL"; ["mediawiki/extensions/OfflineContentGenerator-service"] = "EOCS"; ["mediawiki/extensions/OfflineContentGenerator-bundler"] = "EOCB"; ["mediawiki/extensions/OfflineContentGenerator-html_renderer"] = "EOCH"; ["mediawiki/extensions/OfflineContentGenerator-latex_renderer"] = "EOCL"; ["mediawiki/extensions/OfflineContentGenerator-node_modules"] = "EOCN"; ["mediawiki/extensions/OfflineContentGenerator-text_renderer"] = "EOCT"; ["mediawiki/extensions/OfflineContentGenerator-zim_renderer"] = "EOCZ"; ["mediawiki/extensions/CommentPages"] = "ECMP"; ["mediawiki/extensions/Commentbox"] = "ECMB"; ["mediawiki/extensions/Comments"] = "ECMT"; ["mediawiki/extensions/CommonMessages"] = "ECMM"; ["mediawiki/extensions/CommonsMetadata"] = "ECMD"; ["mediawiki/extensions/CommunityApplications"] = "ECOA"; ["mediawiki/extensions/CommunityHiring"] = "ECOH"; ["mediawiki/extensions/CommunityTwitter"] = "ECOT"; ["mediawiki/extensions/CommunityVoice"] = "ECOV"; ["mediawiki/extensions/ConditionalShowSection"] = "ECON"; ["mediawiki/extensions/Configure"] = "ECFG"; ["mediawiki/extensions/ConfirmAccount"] = "ECAC"; ["mediawiki/extensions/ConfirmEdit"] = "ECOE"; ["mediawiki/extensions/CongressLookup"] = "ECLP"; ["mediawiki/extensions/ContactPage"] = "ECPA"; ["mediawiki/extensions/ContactPageFundraiser"] = "ECPF"; ["mediawiki/extensions/ContentTranslation"] = "ECTX"; ["mediawiki/extensions/Contest"] = "ECST"; ["mediawiki/extensions/ContributionReporting"] = "ECNR"; ["mediawiki/extensions/ContributionScores"] = "ECNS"; ["mediawiki/extensions/ContributionTracking"] = "ECNT"; ["mediawiki/extensions/Contributors"] = "ECNN"; ["mediawiki/extensions/Convention"] = "ECOX"; ["mediawiki/extensions/Convert2Wiki"] = "ECTW"; ["mediawiki/extensions/CopyToClipboard"] = "ECTC"; ["mediawiki/extensions/CreatePage"] = "ECRP"; ["mediawiki/extensions/CreateRedirect"] = "ECRR"; ["mediawiki/extensions/CreditTab"] = "ECTA"; ["mediawiki/extensions/CreditsSource"] = "ECSO"; ["mediawiki/extensions/CryoKey"] = "ECRK"; ["mediawiki/extensions/CustomData"] = "ECUD"; ["mediawiki/extensions/CustomUserSignup"] = "ECUS"; ["mediawiki/extensions/DPLforum"] = "EDPF"; ["mediawiki/extensions/DataTransfer"] = "EDTR"; ["mediawiki/extensions/DataTypes"] = "EDTY"; ["mediawiki/extensions/DebugMode"] = "EDBG"; ["mediawiki/extensions/DeleteBatch"] = "EDBA"; ["mediawiki/extensions/DeleteOwn"] = "EDOW"; ["mediawiki/extensions/Description2"] = "EDES"; ["mediawiki/extensions/DetectLanguage"] = "EDLA"; ["mediawiki/extensions/DeviceMapLogCapture"] = "EDML"; ["mediawiki/extensions/Diagnosis"] = "EDIA"; ["mediawiki/extensions/Dice"] = "EDIE"; ["mediawiki/extensions/DidYouKnow"] = "EDYK"; ["mediawiki/extensions/DidYouMean"] = "EDYM"; ["mediawiki/extensions/DisableAccount"] = "EDAC"; ["mediawiki/extensions/Disambiguator"] = "EDIS"; ["mediawiki/extensions/DiscussionThreading"] = "EDTH"; ["mediawiki/extensions/DismissableSiteNotice"] = "EDSN"; ["mediawiki/extensions/DisqusTag"] = "EDQT"; ["mediawiki/extensions/DjangoAnalytics"] = "EDJA"; ["mediawiki/extensions/DonationInterface"] = "EDOI"; ["mediawiki/extensions/DoubleWiki"] = "EDWI"; ["mediawiki/extensions/DownloadCounter"] = "EDCO"; ["mediawiki/extensions/Drafts"] = "EDRA"; ["mediawiki/extensions/DumpHTML"] = "EDHT"; ["mediawiki/extensions/Duplicator"] = "EDUP"; ["mediawiki/extensions/DynamicPageList"] = "EDPL"; ["mediawiki/extensions/DynamicSidebar"] = "EDSB"; ["mediawiki/extensions/E3Experiments"] = "EEEE"; ["mediawiki/extensions/Echo"] = "ECHO"; ["mediawiki/extensions/EditPageTracking"] = "EEPT"; ["mediawiki/extensions/EditSimilar"] = "EESI"; ["mediawiki/extensions/EditSubpages"] = "EESP"; ["mediawiki/extensions/Editcount"] = "EECT"; ["mediawiki/extensions/EducationProgram"] = "EEDU"; ["mediawiki/extensions/Elastica"] = "EELA"; ["mediawiki/extensions/EmailCapture"] = "EMCP"; ["mediawiki/extensions/EnhanceContactForm"] = "EECF"; ["mediawiki/extensions/ErrorHandler"] = "EERR"; ["mediawiki/extensions/EtherEditor"] = "EETH"; ["mediawiki/extensions/EtherpadLite"] = "EEPL"; ["mediawiki/extensions/EventLogging"] = "EEVL"; ["mediawiki/extensions/ExpandTemplates"] = "EETE"; ["mediawiki/extensions/ExtTab"] = "EEXT"; ["mediawiki/extensions/ExtensionDistributor"] = "EXDI"; ["mediawiki/extensions/ExternalArticles"] = "EXAR"; ["mediawiki/extensions/ExternalData"] = "EXDA"; ["mediawiki/extensions/ExtraLanguageLink"] = "EXLL"; ["mediawiki/extensions/FanBoxes"] = "EFAN"; ["mediawiki/extensions/FeaturedFeeds"] = "EFFD"; ["mediawiki/extensions/FeedsFromPrivateWikis"] = "EFFP"; ["mediawiki/extensions/FilterListUsers"] = "EFLU"; ["mediawiki/extensions/FirstSteps"] = "EFIR"; ["mediawiki/extensions/FixedHeaderTable"] = "EFHT"; ["mediawiki/extensions/FlaggedRevs"] = "EFLR"; ["mediawiki/extensions/Flow"] = "EFLW"; ["mediawiki/extensions/FlvHandler"] = "EFLV"; ["mediawiki/extensions/ForcePreview"] = "EFOP"; ["mediawiki/extensions/FormPreloadPostCache"] = "EFPP"; ["mediawiki/extensions/FormatDates"] = "EFOD"; ["mediawiki/extensions/FormatNum"] = "EFON"; ["mediawiki/extensions/FormelApplet"] = "EFAP"; ["mediawiki/extensions/Foxway"] = "EFOX"; ["mediawiki/extensions/FundraiserLandingPage"] = "EFUL"; ["mediawiki/extensions/FundraisingChart"] = "EFCH"; ["mediawiki/extensions/FundraisingEmailUnsubscribe"] = "EFEU"; ["mediawiki/extensions/FundraisingTranslateWorkflow"] = "EFTW"; ["mediawiki/extensions/GWToolset"] = "EGWT"; ["mediawiki/extensions/Gadgets"] = "EGAD"; ["mediawiki/extensions/Genderize"] = "EGEN"; ["mediawiki/extensions/GeoCrumbs"] = "EGCR"; ["mediawiki/extensions/GeoData"] = "EGDA"; ["mediawiki/extensions/GeoGebra"] = "EGGE"; ["mediawiki/extensions/GettingStarted"] = "EGST"; ["mediawiki/extensions/Git2Pages"] = "EGTP"; ["mediawiki/extensions/Gitweb"] = "EGWE"; ["mediawiki/extensions/GlobalBlocking"] = "EGBL"; ["mediawiki/extensions/GlobalContributions"] = "EGCO"; ["mediawiki/extensions/GlobalCssJs"] = "EGCJ"; ["mediawiki/extensions/GlobalNotice"] = "EGNO"; ["mediawiki/extensions/GlobalPreferences"] = "EGPR"; ["mediawiki/extensions/GlobalUsage"] = "EGUS"; ["mediawiki/extensions/GlobalUserGroups"] = "EGUG"; ["mediawiki/extensions/GlobalUserPage"] = "EGUP"; ["mediawiki/extensions/GlobalUserrights"] = "EGUR"; ["mediawiki/extensions/GoToShell"] = "EGTS"; ["mediawiki/extensions/GoogleAdSense"] = "EGAS"; ["mediawiki/extensions/GoogleAppEngine"] = "EGAE"; ["mediawiki/extensions/GoogleCustomWikiSearch"] = "EGCW"; ["mediawiki/extensions/GoogleDocTag"] = "EGDT"; ["mediawiki/extensions/GoogleDocs4MW"] = "EGDM"; ["mediawiki/extensions/GoogleLogin"] = "EGLO"; ["mediawiki/extensions/GoogleMaps"] = "EGMA"; ["mediawiki/extensions/GoogleNewsSitemap"] = "EGNS"; ["mediawiki/extensions/GooglePlusOne"] = "EGPO"; ["mediawiki/extensions/GoogleSiteSearch"] = "EGSS"; ["mediawiki/extensions/Graph"] = "EGRA"; ["mediawiki/extensions/GraphViz"] = "EGVI"; ["mediawiki/extensions/GroupsSidebar"] = "EGSB"; ["mediawiki/extensions/GuidedTour"] = "EGTO"; ["mediawiki/extensions/GuidedTour-guiders"] = "EGTG"; ["mediawiki/extensions/HSTS"] = "EHST"; ["mediawiki/extensions/HTMLTags"] = "EHTT"; ["mediawiki/extensions/HTMLets"] = "EHTL"; ["mediawiki/extensions/HashTables"] = "EHAT"; ["mediawiki/extensions/HeaderTabs"] = "EHET"; ["mediawiki/extensions/HelpCommons"] = "EHCO"; ["mediawiki/extensions/HelpPages"] = "EHPA"; ["mediawiki/extensions/HidePrefix"] = "EHPR"; ["mediawiki/extensions/HierarchyBuilder"] = "EHIB"; ["mediawiki/extensions/HostStats"] = "EHOS"; ["mediawiki/extensions/Hovergallery"] = "EHOV"; ["mediawiki/extensions/I18nTags"] = "EINT"; ["mediawiki/extensions/IfTemplates"] = "EIFT"; ["mediawiki/extensions/IframePage"] = "EIFP"; ["mediawiki/extensions/ImageLink"] = "EILI"; ["mediawiki/extensions/ImageMap"] = "EIMA"; ["mediawiki/extensions/ImageMetrics"] = "EIME"; ["mediawiki/extensions/ImageTagging"] = "EIMT"; ["mediawiki/extensions/IndexFunction"] = "EINF"; ["mediawiki/extensions/InlineCategorizer"] = "EINC"; ["mediawiki/extensions/InputBox"] = "EINB"; ["mediawiki/extensions/Insider"] = "EINS"; ["mediawiki/extensions/InteractiveBlockMessage"] = "EIBM"; ["mediawiki/extensions/Interlanguage"] = "EILA"; ["mediawiki/extensions/Interwiki"] = "EIWA"; ["mediawiki/extensions/InterwikiIntegration"] = "EIWI"; ["mediawiki/extensions/InterwikiMagic"] = "EIWM"; ["mediawiki/extensions/InterwikiMap"] = "EIWN"; ["mediawiki/extensions/InviteSignup"] = "EIVS"; ["mediawiki/extensions/IssueTracker"] = "EIST"; ["mediawiki/extensions/JSBreadCrumbs"] = "EJSB"; ["mediawiki/extensions/Josa"] = "EJOS"; ["mediawiki/extensions/JsonConfig"] = "EJSC"; ["mediawiki/extensions/JsonData"] = "EJSD"; ["mediawiki/extensions/JsonData-JsonSchema"] = "EJSS"; ["mediawiki/extensions/LabeledSectionTransclusion"] = "ELST"; ["mediawiki/extensions/LandingCheck"] = "ELCH"; ["mediawiki/extensions/LanguageSelector"] = "ELSR"; ["mediawiki/extensions/LanguageTag"] = "ELTA"; ["mediawiki/extensions/LastModified"] = "ELMO"; ["mediawiki/extensions/LdapAuthentication"] = "ELDA"; ["mediawiki/extensions/Less"] = "ELES"; ["mediawiki/extensions/LifeWeb"] = "ELWE"; ["mediawiki/extensions/LifeWebCore"] = "ELWC"; ["mediawiki/extensions/LightweightRDFa"] = "ELRA"; ["mediawiki/extensions/Limn"] = "ELIM"; ["mediawiki/extensions/Lingo"] = "ELIN"; ["mediawiki/extensions/LinkFilter"] = "ELIF"; ["mediawiki/extensions/LinkSuggest"] = "ELIS"; ["mediawiki/extensions/LinkedWiki"] = "ELIW"; ["mediawiki/extensions/LiquidThreads"] = "ELQT"; ["mediawiki/extensions/ListSignup"] = "ELSS"; ["mediawiki/extensions/Listings"] = "ELSG"; ["mediawiki/extensions/LiveTranslate"] = "ELIT"; ["mediawiki/extensions/LocalisationUpdate"] = "ELOC"; ["mediawiki/extensions/LockDownEnglishPages"] = "ELDE"; ["mediawiki/extensions/Lockdown"] = "ELCK"; ["mediawiki/extensions/LogEntry"] = "ELGE"; ["mediawiki/extensions/LogoFunctions"] = "ELOG"; ["mediawiki/extensions/LookupUser"] = "ELOU"; ["mediawiki/extensions/LoopFunctions"] = "ELOF"; ["mediawiki/extensions/Loops"] = "ELOO"; ["mediawiki/extensions/MSSQLBackCompat"] = "EMSQ"; ["mediawiki/extensions/MWSearch"] = "EMWS"; ["mediawiki/extensions/MagicNoCache"] = "EMNC"; ["mediawiki/extensions/Maintenance"] = "EMAI"; ["mediawiki/extensions/MaintenanceShell"] = "EMSH"; ["mediawiki/extensions/Mantle"] = "EMAN"; ["mediawiki/extensions/MapSources"] = "EMSO"; ["mediawiki/extensions/Maps"] = "EMAP"; ["mediawiki/extensions/MarkAsHelpful"] = "EMAH"; ["mediawiki/extensions/MassEditRegex"] = "EMER"; ["mediawiki/extensions/MassMessage"] = "EMAM"; ["mediawiki/extensions/Math"] = "EMAT"; ["mediawiki/extensions/MathSearch"] = "EMAS"; ["mediawiki/extensions/MediaFunctions"] = "EMFU"; ["mediawiki/extensions/MediaWikiAuth"] = "EMWA"; ["mediawiki/extensions/MediaWikiChat"] = "EMWC"; ["mediawiki/extensions/MiniInvite"] = "EMIV"; ["mediawiki/extensions/Minifier"] = "EMIN"; ["mediawiki/extensions/MixedNamespaceSearchSuggestions"] = "EMNS"; ["mediawiki/extensions/MobileApp"] = "EMOB"; ["mediawiki/extensions/MobileDetect"] = "EMDE"; ["mediawiki/extensions/MobileFrontend"] = "EMFR"; ["mediawiki/extensions/Model"] = "EMOD"; ["mediawiki/extensions/MolHandler"] = "EMOL"; ["mediawiki/extensions/MoodBar"] = "EMOO"; ["mediawiki/extensions/Moodle"] = "EMDL"; ["mediawiki/extensions/Mpdf"] = "EMPD"; ["mediawiki/extensions/MsLinks"] = "EMSL"; ["mediawiki/extensions/MsUpload"] = "EMSU"; ["mediawiki/extensions/MultiMaps"] = "EMMA"; ["mediawiki/extensions/MultiUpload"] = "EMUP"; ["mediawiki/extensions/MultimediaPlayer"] = "EMMP"; ["mediawiki/extensions/MultimediaViewer"] = "EMMV"; ["mediawiki/extensions/MwEmbedSupport"] = "EMES"; ["mediawiki/extensions/MyVariables"] = "EMYV"; ["mediawiki/extensions/NSFileRepo"] = "ENSF"; ["mediawiki/extensions/NamespaceHTML"] = "ENSH"; ["mediawiki/extensions/NamespacePaths"] = "ENSP"; ["mediawiki/extensions/NamespaceRelations"] = "ENSR"; ["mediawiki/extensions/Narayam"] = "ENAR"; ["mediawiki/extensions/NaturalLanguageList"] = "ENLL"; ["mediawiki/extensions/NavigationTiming"] = "ENTI"; ["mediawiki/extensions/Negref"] = "ENEG"; ["mediawiki/extensions/NetworkAuth"] = "ENAU"; ["mediawiki/extensions/NewSignupPage"] = "ENSU"; ["mediawiki/extensions/NewUserMessage"] = "ENUM"; ["mediawiki/extensions/NewUserNotif"] = "ENUN"; ["mediawiki/extensions/NewUsersList"] = "ENUL"; ["mediawiki/extensions/NewestPages"] = "ENWP"; ["mediawiki/extensions/News"] = "ENEW"; ["mediawiki/extensions/NewsBox"] = "ENBX"; ["mediawiki/extensions/Newsletter"] = "ENLT"; ["mediawiki/extensions/NoTitle"] = "ENOT"; ["mediawiki/extensions/Nonlinear"] = "ENOL"; ["mediawiki/extensions/Nostalgia"] = "ENOS"; ["mediawiki/extensions/Nuke"] = "ENUK"; ["mediawiki/extensions/NukeDPL"] = "ENUD"; ["mediawiki/extensions/NumberFormat"] = "ENFM"; ["mediawiki/extensions/NumberOfWikis"] = "ENOW"; ["mediawiki/extensions/Numbertext"] = "ENUT"; ["mediawiki/extensions/NumerAlpha"] = "ENUA"; ["mediawiki/extensions/OAI"] = "EOAI"; ["mediawiki/extensions/OATHAuth"] = "EOAT"; ["mediawiki/extensions/OAuth"] = "EOAU"; ["mediawiki/extensions/OAuthAuthentication"] = "EOAA"; ["mediawiki/extensions/OdbcDatabase"] = "EODB"; ["mediawiki/extensions/Offline"] = "EOFF"; ["mediawiki/extensions/OfflineImportLexicon"] = "EOIL"; ["mediawiki/extensions/OggHandler"] = "EOGG"; ["mediawiki/extensions/OnlineStatus"] = "EOSS"; ["mediawiki/extensions/OnlineStatusBar"] = "EOSB"; ["mediawiki/extensions/OnlyRecentRecentChanges"] = "EORR"; ["mediawiki/extensions/OpenBadges"] = "EOBA"; ["mediawiki/extensions/OpenGraphMeta"] = "EOGM"; ["mediawiki/extensions/OpenID"] = "EOID"; ["mediawiki/extensions/OpenSearchXml"] = "EOSX"; ["mediawiki/extensions/OpenStackManager"] = "EOST"; ["mediawiki/extensions/OpenStreetMapSlippyMap"] = "EOSM"; ["mediawiki/extensions/OracleTextSearch"] = "EOTS"; ["mediawiki/extensions/Oversight"] = "EOVS"; ["mediawiki/extensions/PGFTikZ"] = "ETKZ"; ["mediawiki/extensions/PHPExcel"] = "EXCL"; ["mediawiki/extensions/PageBlock"] = "EPBL"; ["mediawiki/extensions/PageCreationNotif"] = "EPCN"; ["mediawiki/extensions/PageDisqus"] = "EPDQ"; ["mediawiki/extensions/PageImages"] = "EPIM"; ["mediawiki/extensions/PageInCat"] = "EPIC"; ["mediawiki/extensions/PageLanguage"] = "EPLA"; ["mediawiki/extensions/PageNotice"] = "EPNO"; ["mediawiki/extensions/PageSchemas"] = "EPSC"; ["mediawiki/extensions/PageTools"] = "EPTO"; ["mediawiki/extensions/PageTriage"] = "EPTR"; ["mediawiki/extensions/PagedTiffHandler"] = "EPTH"; ["mediawiki/extensions/PanScroll"] = "EPAN"; ["mediawiki/extensions/ParserFun"] = "EPFU"; ["mediawiki/extensions/ParserFunctions"] = "EPFN"; ["mediawiki/extensions/ParserHooks"] = "EPHO"; ["mediawiki/extensions/Parsoid"] = "EPAR"; ["mediawiki/extensions/Parsoid-cpp-contrib-libhubbub"] = "EPAH"; ["mediawiki/extensions/Parsoid-cpp-contrib-pugixml"] = "EPAP"; ["mediawiki/extensions/Parsoid-js-contrib"] = "EPJS"; ["mediawiki/extensions/PdfBook"] = "EPBO"; ["mediawiki/extensions/PdfExport"] = "EPEX"; ["mediawiki/extensions/PdfHandler"] = "EPHD"; ["mediawiki/extensions/PerPageLicense"] = "EPPL"; ["mediawiki/extensions/Persona"] = "EPER"; ["mediawiki/extensions/Petition"] = "EPET"; ["mediawiki/extensions/Phalanx"] = "EPHA"; ["mediawiki/extensions/PhpHighlight"] = "EPHI"; ["mediawiki/extensions/PhpTags"] = "ETAG"; ["mediawiki/extensions/PhpTagsDebugger"] = "ETDE"; ["mediawiki/extensions/PhpTagsFunctions"] = "ETFU"; ["mediawiki/extensions/PhpTagsMaps"] = "ETMA"; ["mediawiki/extensions/PhpTagsSMW"] = "ETSM"; ["mediawiki/extensions/PhpTagsWidgets"] = "ETWD"; ["mediawiki/extensions/PhpTagsWiki"] = "ETWK"; ["mediawiki/extensions/PictureGame"] = "EPGA"; ["mediawiki/extensions/Poem"] = "EPOE"; ["mediawiki/extensions/Poll"] = "EPOL"; ["mediawiki/extensions/PollNY"] = "EPNY"; ["mediawiki/extensions/Polyglot"] = "EPGT"; ["mediawiki/extensions/PoolCounter"] = "EPOC"; ["mediawiki/extensions/PopupPages"] = "EPPP"; ["mediawiki/extensions/Popups"] = "EPOP"; ["mediawiki/extensions/PostEdit"] = "EPOS"; ["mediawiki/extensions/PrefStats"] = "EPST"; ["mediawiki/extensions/PrefSwitch"] = "EPSW"; ["mediawiki/extensions/Premoderation"] = "EPRM"; ["mediawiki/extensions/PrivateDomains"] = "EPRD"; ["mediawiki/extensions/PronunciationRecording"] = "EPRR"; ["mediawiki/extensions/ProofreadPage"] = "EPRP"; ["mediawiki/extensions/ProtectSite"] = "EPRO"; ["mediawiki/extensions/ProxyListDb"] = "EPLD"; ["mediawiki/extensions/PubSubHubbub"] = "EPSH"; ["mediawiki/extensions/PureWikiDeletion"] = "EPWD"; ["mediawiki/extensions/PurgeClickThrough"] = "EPCT"; ["mediawiki/extensions/Push"] = "EPUS"; ["mediawiki/extensions/PushToWatch"] = "EPTW"; ["mediawiki/extensions/Quantcast"] = "EQCS"; ["mediawiki/extensions/QuickResponse"] = "EQRS"; ["mediawiki/extensions/Quiz"] = "EQUI"; ["mediawiki/extensions/QuizGame"] = "EQGA"; ["mediawiki/extensions/QuizTabulate"] = "EQTA"; ["mediawiki/extensions/RDFIO"] = "ERDF"; ["mediawiki/extensions/RPED"] = "ERPE"; ["mediawiki/extensions/RSS"] = "ERSS"; ["mediawiki/extensions/RT"] = "ERQT"; ["mediawiki/extensions/RandomFeaturedUser"] = "ERFU"; ["mediawiki/extensions/RandomGameUnit"] = "ERGU"; ["mediawiki/extensions/RandomImage"] = "ERIM"; ["mediawiki/extensions/RandomImageByCategory"] = "ERIC"; ["mediawiki/extensions/RandomInCategory"] = "ERAC"; ["mediawiki/extensions/RandomRootPage"] = "ERRP"; ["mediawiki/extensions/RandomUsersWithAvatars"] = "ERUA"; ["mediawiki/extensions/Ratings"] = "ERAT"; ["mediawiki/extensions/ReaderFeedback"] = "ERFE"; ["mediawiki/extensions/ReassignEdits"] = "ERAE"; ["mediawiki/extensions/RecentActivityFeed"] = "ERAF"; ["mediawiki/extensions/RefreshSpecial"] = "ERES"; ["mediawiki/extensions/RegexFun"] = "ERXU"; ["mediawiki/extensions/RegexFunctions"] = "ERXF"; ["mediawiki/extensions/RelatedArticles"] = "ERAR"; ["mediawiki/extensions/RelatedSites"] = "ERSI"; ["mediawiki/extensions/RelationLinks"] = "ERLI"; ["mediawiki/extensions/Renameuser"] = "EREN"; ["mediawiki/extensions/ReorderParserPhases"] = "ERPP"; ["mediawiki/extensions/ReplaceSet"] = "ERPS"; ["mediawiki/extensions/ReplaceText"] = "ERPT"; ["mediawiki/extensions/RevisionCommentSupplement"] = "ERCS"; ["mediawiki/extensions/RightFunctions"] = "ERIF"; ["mediawiki/extensions/SSLClientAuthentication"] = "ESCA"; ["mediawiki/extensions/SVGEdit"] = "ESVE"; ["mediawiki/extensions/SacredText"] = "ESAT"; ["mediawiki/extensions/SandboxLink"] = "ESAL"; ["mediawiki/extensions/Sarcasm"] = "ESAR"; ["mediawiki/extensions/ScanSet"] = "ESST"; ["mediawiki/extensions/Score"] = "ESCR"; ["mediawiki/extensions/Screenplay"] = "ESCP"; ["mediawiki/extensions/Scribunto"] = "ELUA"; ["mediawiki/extensions/SearchExtraNS"] = "ESEN"; ["mediawiki/extensions/SearchRealnames"] = "ESRE"; ["mediawiki/extensions/SectionDisqus"] = "ESDQ"; ["mediawiki/extensions/SecureHTML"] = "ESHT"; ["mediawiki/extensions/SecurePasswords"] = "ESPW"; ["mediawiki/extensions/SecurePoll"] = "ESPO"; ["mediawiki/extensions/SecureSessions"] = "ESSE"; ["mediawiki/extensions/SelectCategory"] = "ESLC"; ["mediawiki/extensions/SelectTag"] = "ESLT"; ["mediawiki/extensions/SemanticACL"] = "ESAC"; ["mediawiki/extensions/SemanticBundle"] = "ESBU"; ["mediawiki/extensions/SemanticComments"] = "ESCO"; ["mediawiki/extensions/SemanticCompoundQueries"] = "ESCQ"; ["mediawiki/extensions/SemanticDrilldown"] = "ESDD"; ["mediawiki/extensions/SemanticDummyEditor"] = "ESDE"; ["mediawiki/extensions/SemanticExpressiveness"] = "ESEX"; ["mediawiki/extensions/SemanticExtraSpecialProperties"] = "ESES"; ["mediawiki/extensions/SemanticForms"] = "ESFO"; ["mediawiki/extensions/SemanticFormsInputs"] = "ESFI"; ["mediawiki/extensions/SemanticGenealogy"] = "ESGE"; ["mediawiki/extensions/SemanticGlossary"] = "ESGL"; ["mediawiki/extensions/SemanticHighcharts"] = "ESHI"; ["mediawiki/extensions/SemanticImageAnnotator"] = "ESIA"; ["mediawiki/extensions/SemanticImageInput"] = "ESII"; ["mediawiki/extensions/SemanticInternalObjects"] = "ESIO"; ["mediawiki/extensions/SemanticMaps"] = "ESMA"; ["mediawiki/extensions/SemanticMediaWiki"] = "ESMW"; ["mediawiki/extensions/SemanticPageMaker"] = "ESPM"; ["mediawiki/extensions/SemanticPageSeries"] = "ESPS"; ["mediawiki/extensions/SemanticRating"] = "ESRA"; ["mediawiki/extensions/SemanticResultFormats"] = "ESRF"; ["mediawiki/extensions/SemanticSifter"] = "ESSI"; ["mediawiki/extensions/SemanticSignup"] = "ESSU"; ["mediawiki/extensions/SemanticTasks"] = "ESTA"; ["mediawiki/extensions/SemanticTitle"] = "ESTI"; ["mediawiki/extensions/SemanticUpdateOnPurge"] = "ESUP"; ["mediawiki/extensions/SemanticWatchlist"] = "ESWL"; ["mediawiki/extensions/SemanticWebBrowser"] = "ESWB"; ["mediawiki/extensions/SharedCssJs"] = "ESCJ"; ["mediawiki/extensions/ShortUrl"] = "ESUR"; ["mediawiki/extensions/ShortUrlApi"] = "ESUA"; ["mediawiki/extensions/ShoutBox"] = "ESBO"; ["mediawiki/extensions/ShoutWikiAds"] = "ESWA"; ["mediawiki/extensions/SideBarMenu"] = "ESBM"; ["mediawiki/extensions/SidebarDonateBox"] = "ESDB"; ["mediawiki/extensions/SignWritingMediaWikiPlugin"] = "ESWP"; ["mediawiki/extensions/SimpleAntiSpam"] = "ESAS"; ["mediawiki/extensions/SimpleChanges"] = "ESCH"; ["mediawiki/extensions/SimpleFarm"] = "ESFA"; ["mediawiki/extensions/SimpleSecurity"] = "ESSC"; ["mediawiki/extensions/SimpleSurvey"] = "ESIS"; ["mediawiki/extensions/SiteMatrix"] = "ESMX"; ["mediawiki/extensions/SiteMetrics"] = "ESMT"; ["mediawiki/extensions/SiteScout"] = "ESCT"; ["mediawiki/extensions/SiteSettings"] = "ESET"; ["mediawiki/extensions/SkelJS"] = "ESJS"; ["mediawiki/extensions/SkinPerNamespace"] = "ESPN"; ["mediawiki/extensions/SkinPerPage"] = "ESPP"; ["mediawiki/extensions/SlimboxThumbs"] = "ESBT"; ["mediawiki/extensions/SmoothGallery"] = "ESMG"; ["mediawiki/extensions/SocialLogin"] = "ESLI"; ["mediawiki/extensions/SocialProfile"] = "ESPR"; ["mediawiki/extensions/SoftwareVersion"] = "ESVN"; ["mediawiki/extensions/Solarium"] = "ESLA"; ["mediawiki/extensions/SolrStore"] = "ESOS"; ["mediawiki/extensions/SoundManager2Button"] = "ESMB"; ["mediawiki/extensions/SpamBlacklist"] = "ESPB"; ["mediawiki/extensions/Spark"] = "ESPK"; ["mediawiki/extensions/Special404"] = "ESPF"; ["mediawiki/extensions/SpecialNamespaces"] = "ESNS"; ["mediawiki/extensions/SpellingApi"] = "ESPA"; ["mediawiki/extensions/SportsTeams"] = "ESPT"; ["mediawiki/extensions/Spreadsheet"] = "ESSH"; ["mediawiki/extensions/StaffEdits"] = "ESTE"; ["mediawiki/extensions/StalkerLog"] = "ESTL"; ["mediawiki/extensions/StarterWiki"] = "ESTW"; ["mediawiki/extensions/StickToThatLanguage"] = "ESTT"; ["mediawiki/extensions/StopForumSpam"] = "ESFS"; ["mediawiki/extensions/StrategyWiki"] = "ESTR"; ["mediawiki/extensions/StringFunctionsEscaped"] = "ESFE"; ["mediawiki/extensions/SubPageList"] = "ESPL"; ["mediawiki/extensions/SubPageList3"] = "ESPC"; ["mediawiki/extensions/SubpageFun"] = "ESFN"; ["mediawiki/extensions/SubpageSortkey"] = "ESSK"; ["mediawiki/extensions/Sudo"] = "ESUD"; ["mediawiki/extensions/Suhosin"] = "ESUH"; ["mediawiki/extensions/Survey"] = "ESUV"; ["mediawiki/extensions/SwarmExport"] = "ESWX"; ["mediawiki/extensions/SwiftCloudFiles"] = "ESCF"; ["mediawiki/extensions/SwiftMailer"] = "ESWM"; ["mediawiki/extensions/SyntaxHighlight_GeSHi"] = "ESHG"; ["mediawiki/extensions/SyntaxHighlighter"] = "ESHL"; ["mediawiki/extensions/Tabber"] = "ETBR"; ["mediawiki/extensions/Tabs"] = "ETAB"; ["mediawiki/extensions/Teahouse"] = "ETEA"; ["mediawiki/extensions/TemplateData"] = "ETDA"; ["mediawiki/extensions/TemplateInfo"] = "ETIN"; ["mediawiki/extensions/TemplateSandbox"] = "ETSA"; ["mediawiki/extensions/TextExtracts"] = "ETEX"; ["mediawiki/extensions/Thanks"] = "ETHA"; ["mediawiki/extensions/Theme"] = "ETHM"; ["mediawiki/extensions/ThemeDesigner"] = "ETHD"; ["mediawiki/extensions/ThrottleOverride"] = "ETHO"; ["mediawiki/extensions/ThumbParser"] = "ETHP"; ["mediawiki/extensions/TimeMachine"] = "ETIM"; ["mediawiki/extensions/TimedMediaHandler"] = "ETMH"; ["mediawiki/extensions/TimelineTable"] = "ETLT"; ["mediawiki/extensions/TimezoneSelector"] = "ETZS"; ["mediawiki/extensions/TitleBlacklist"] = "ETBL"; ["mediawiki/extensions/TitleIcon"] = "ETIC"; ["mediawiki/extensions/TitleKey"] = "ETIK"; ["mediawiki/extensions/TocTree"] = "ETTR"; ["mediawiki/extensions/Tooltip"] = "ETTI"; ["mediawiki/extensions/TorBlock"] = "ETOR"; ["mediawiki/extensions/Translate"] = "ETRA"; ["mediawiki/extensions/TranslateSvg"] = "ETRS"; ["mediawiki/extensions/TranslationNotifications"] = "ETRN"; ["mediawiki/extensions/Transliterator"] = "ETRX"; ["mediawiki/extensions/TrustedXFF"] = "ETXF"; ["mediawiki/extensions/TweetANew"] = "ETAN"; ["mediawiki/extensions/TwitterCards"] = "ETWC"; ["mediawiki/extensions/TwitterLogin"] = "ETWL"; ["mediawiki/extensions/TwnMainPage"] = "ETWN"; ["mediawiki/extensions/TwoFactorAuthentication"] = "ETFA"; ["mediawiki/extensions/UIFeedback"] = "EUIF"; ["mediawiki/extensions/URNames"] = "EURN"; ["mediawiki/extensions/UnicodeConverter"] = "EUCO"; ["mediawiki/extensions/UnitTest"] = "EUTE"; ["mediawiki/extensions/UniversalLanguageSelector"] = "EULS"; ["mediawiki/extensions/UpdateMediaWiki"] = "EUMW"; ["mediawiki/extensions/UploadBlacklist"] = "EUBL"; ["mediawiki/extensions/UploadLocal"] = "EULO"; ["mediawiki/extensions/UploadWizard"] = "EUWI"; ["mediawiki/extensions/UrlGetParameters"] = "EUGP"; ["mediawiki/extensions/UrlShortener"] = "EUSH"; ["mediawiki/extensions/UserDailyContribs"] = "EUDC"; ["mediawiki/extensions/UserFunctions"] = "EUFU"; ["mediawiki/extensions/UserGroups"] = "EUGR"; ["mediawiki/extensions/UserMerge"] = "EUME"; ["mediawiki/extensions/UserOptionStats"] = "EUOS"; ["mediawiki/extensions/UserPageViewTracker"] = "EUPV"; ["mediawiki/extensions/UserStatus"] = "EUST"; ["mediawiki/extensions/UserThrottle"] = "EUTH"; ["mediawiki/extensions/VIKI"] = "EVIK"; ["mediawiki/extensions/Validator"] = "EVAL"; ["mediawiki/extensions/ValueView"] = "EVVI"; ["mediawiki/extensions/Variables"] = "EVAR"; ["mediawiki/extensions/Vector"] = "EVEC"; ["mediawiki/extensions/BetaSandbox"] = "EBSA"; ["mediawiki/extensions/Video"] = "EVID"; ["mediawiki/extensions/VideoJsPlayer"] = "EVJS"; ["mediawiki/extensions/ViewFiles"] = "EVFI"; ["mediawiki/extensions/Views"] = "EVWS"; ["mediawiki/extensions/Vine"] = "EVIN"; ["mediawiki/extensions/VipsScaler"] = "EVIP"; ["mediawiki/extensions/VisualChat"] = "EVCH"; ["mediawiki/extensions/VisualEditor-MediaWiki"] = "EVED"; ["mediawiki/extensions/VoteNY"] = "EVNY"; ["mediawiki/extensions/WYSIWYG"] = "EWYS"; ["mediawiki/extensions/WantedPagesFromNS"] = "EWPN"; ["mediawiki/extensions/WatchSubpages"] = "EWSP"; ["mediawiki/extensions/WebCache"] = "EWCA"; ["mediawiki/extensions/WebChat"] = "EWCH"; ["mediawiki/extensions/WebFonts"] = "EWBF"; ["mediawiki/extensions/WebPlatformAuth"] = "EWPA"; ["mediawiki/extensions/WebPlatformSearchAutocomplete"] = "EWPC"; ["mediawiki/extensions/WhiteSpace"] = "EWHI"; ["mediawiki/extensions/WhitelistPages"] = "EWHP"; ["mediawiki/extensions/WhoIsWatching"] = "EWIW"; ["mediawiki/extensions/Widgets"] = "EWID"; ["mediawiki/extensions/WikEdDiff"] = "EWEF"; ["mediawiki/extensions/WikiArticleFeeds"] = "EWAF"; ["mediawiki/extensions/WikiCategoryTagCloud"] = "EWCT"; ["mediawiki/extensions/WikiEditor"] = "EWED"; ["mediawiki/extensions/WikiForum"] = "EWFO"; ["mediawiki/extensions/WikiGrok"] = "EWGR"; ["mediawiki/extensions/WikiLexicalData"] = "EWLD"; ["mediawiki/extensions/WikiLove"] = "EWLO"; ["mediawiki/extensions/WikiLovesMonuments"] = "EWLM"; ["mediawiki/extensions/WikiObjectModel"] = "EWOM"; ["mediawiki/extensions/WikiTextLoggedInOut"] = "EWLI"; ["mediawiki/extensions/WikiTwidget"] = "EWTW"; ["mediawiki/extensions/Wikibase"] = "EWBA"; ["mediawiki/extensions/Wikibase-easyrdf"] = "EWBE"; ["mediawiki/extensions/WikibaseClient"] = "EWBC"; ["mediawiki/extensions/WikibaseLib"] = "EWBL"; ["mediawiki/extensions/WikibaseMobile"] = "EWBM"; ["mediawiki/extensions/WikibaseQuery"] = "EWBQ"; ["mediawiki/extensions/WikibaseSolr"] = "EWBS"; ["mediawiki/extensions/Wikidata"] = "EWDA"; ["mediawiki/extensions/WikidataEntitySuggester"] = "EWDE"; ["mediawiki/extensions/Wikilog"] = "EWLG"; ["mediawiki/extensions/WikimediaEvents"] = "EWMV"; ["mediawiki/extensions/WikimediaIncubator"] = "EWMI"; ["mediawiki/extensions/WikimediaMaintenance"] = "EWMA"; ["mediawiki/extensions/WikimediaMessages"] = "EWME"; ["mediawiki/extensions/WikimediaShopLink"] = "EWSL"; ["mediawiki/extensions/WikivoteMapsYandex"] = "EWMY"; ["mediawiki/extensions/WindowsAzureSDK"] = "EWAK"; ["mediawiki/extensions/WindowsAzureStorage"] = "EWAS"; ["mediawiki/extensions/Workflow"] = "EWFL"; ["mediawiki/extensions/XAnalytics"] = "EXAN"; ["mediawiki/extensions/XMLContent"] = "EXCE"; ["mediawiki/extensions/YetAnotherKeywords"] = "EYAK"; ["mediawiki/extensions/YotpoReviews"] = "EYRE"; ["mediawiki/extensions/YouTube"] = "EYTB"; ["mediawiki/extensions/ZeroBanner"] = "EZBA"; ["mediawiki/extensions/ZeroPortal"] = "EZPO"; ["mediawiki/extensions/ZeroRatedMobileAccess"] = "EZRM"; ["mediawiki/extensions/CLDR"] = "ECLD"; ["mediawiki/extensions/examples"] = "EXAM"; ["mediawiki/extensions/GoogleAnalytics"] = "EGAN"; ["mediawiki/extensions/Intersection"] = "EAND"; ["mediawiki/extensions/Timeline"] = "ETLN"; ["mediawiki/extensions/Wikihiero"] = "EHIE"; ["mediawiki/skins/BlueSky"] = "SBLS"; ["mediawiki/skins/BlueSpiceSkin"] = "SBSS"; ["mediawiki/skins/Bouquet"] = "SBOU"; ["mediawiki/skins/CologneBlue"] = "SCBL"; ["mediawiki/skins/Daddio"] = "SDAD"; ["mediawiki/skins/DeskMessMirrored"] = "SDMM"; ["mediawiki/skins/Donate"] = "SDON"; ["mediawiki/skins/Dusk"] = "SDUS"; ["mediawiki/skins/DuskToDawn"] = "SDTD"; ["mediawiki/skins/Example"] = "SEXA"; ["mediawiki/skins/Gamepress"] = "SGPR"; ["mediawiki/skins/GreyStuff"] = "SGRY"; ["mediawiki/skins/Mask"] = "SMSK"; ["mediawiki/skins/Metrolook"] = "SMTL"; ["mediawiki/skins/Modern"] = "SMOD"; ["mediawiki/skins/MonoBook"] = "SMNB"; ["mediawiki/skins/Nimbus"] = "SNIM"; ["mediawiki/skins/Nostalgia"] = "SNOS"; ["mediawiki/skins/Schulenburg"] = "SSCH"; ["mediawiki/skins/Splash"] = "SSPL"; ["mediawiki/skins/Synagonism"] = "SSYN"; ["mediawiki/skins/Tomas"] = "STOM"; ["mediawiki/skins/Truglass"] = "STRU"; ["mediawiki/skins/Vector"] = "SVEC"; ["mediawiki/skins/Apex"] = "SAPX"; ["mediawiki/skins/Chameleon"] = "SCHA"; ["mediawiki/skins/Erudite"] = "SERU"; ["mediawiki/skins/Strapping"] = "SSTR"; ["mediawiki/skins/p2wiki"] = "SPTW"; ["mediawiki/skins/WebPlatform"] = "SWPL"; ["operations/puppet"] = "OPUP"; ["analytics/asana-stats"] = "ANAS"; ["analytics/blog"] = "ANAB"; ["analytics/camus"] = "ANAC"; ["analytics/dashiki"] = "ANAD"; ["analytics/data-warehouse"] = "ANDW"; ["analytics/dclass"] = "ANDC"; ["analytics/geowiki"] = "ANGW"; ["analytics/geowiki-data-public"] = "ANGD"; ["analytics/glass"] = "ANGL"; ["analytics/global-dev-dashboard"] = "ANDE"; ["analytics/global-dev-dashboard-data"] = "ANGF"; ["analytics/kafkatee"] = "ANKA"; ["analytics/kraken"] = "ANKR"; ["analytics/kraken-deploy"] = "ANKD"; ["analytics/libanon"] = "ANLA"; ["analytics/libcidr"] = "ANLC"; ["analytics/limn"] = "ANLI"; ["analytics/limn-ee-data"] = "ANLE"; ["analytics/limn-mobile-data"] = "ANLM"; ["analytics/log2udp2"] = "ANLU"; ["analytics/metrics"] = "ANME"; ["analytics/multimedia"] = "ANMU"; ["analytics/multimedia-config"] = "ANMC"; ["analytics/pageview-api"] = "ANPA"; ["analytics/quarry-web"] = "ANQW"; ["analytics/refinery"] = "ANRE"; ["analytics/refinery-source"] = "ANRS"; ["analytics/reportcard"] = "ANRC"; ["analytics/reportcard-data"] = "ANRD"; ["analytics/snuggle"] = "ANSN"; ["analytics/statsd-ganglia"] = "ANSG"; ["analytics/tools-kripke"] = "ANTK"; ["analytics/udp-filters"] = "ANUF"; ["analytics/udplog"] = "ANUL"; ["analytics/user-metrics"] = "ANUM"; ["analytics/vagrant-build"] = "ANVB"; ["analytics/vagrant-kraken"] = "ANVK"; ["analytics/webstatscollector"] = "ANWC"; ["analytics/wikihadoop"] = "ANWH"; ["analytics/wikimetrics"] = "ANWM"; ["analytics/wikistats"] = "ANWS"; ["analytics/wp-zero"] = "ANZZ"; ["analytics/zero-sms"] = "ANZS"; ["apps/android-commons"] = "APAC"; ["apps/android-java-mwapi"] = "APAJ"; ["apps/android-translate"] = "APAT"; ["apps/android-wikipedia"] = "APAW"; ["apps/firefox-wikipedia"] = "APFW"; ["apps/glass-wikipedia"] = "APGW"; ["apps/ios-commons"] = "APIC"; ["apps/ios-wikipedia"] = "APIW"; ["apps/mobile-WikiLovesMonuments"] = "APWL"; ["apps/win8-wikipedia"] = "APWW"; ["glam-gwtoolset"] = "GLAM"; ["integration/bundler"] = "CIBU"; ["integration/composer"] = "CICP"; ["integration/config"] = "CICF"; ["integration/consistency"] = "CICS"; ["integration/doc"] = "CIDC"; ["integration/docroot"] = "CIDR"; ["integration/jenkins"] = "CIJE"; ["integration/jenkins-job-builder"] = "CIJJ"; ["integration/jenkins-job-builder-config"] = "CIJC"; ["integration/junitdiff"] = "CIJU"; ["integration/phantomjs"] = "CIPJ"; ["integration/php/coveralls"] = "CIPC"; ["integration/phpcs"] = "CIPD"; ["integration/phpunit"] = "CIPU"; ["integration/zuul"] = "CIZU"; ["integration/zuul-config"] = "CIZC"; ["labs/centralauth"] = "LCAU"; ["labs/incubator"] = "LINC"; ["labs/invisible-unicorn"] = "LINU"; ["labs/maps"] = "LMAP"; ["labs/migration-assistant"] = "LMAS"; ["labs/nagios-builder"] = "LNAB"; ["labs/private"] = "LPRI"; ["labs/qmwbot"] = "LQMW"; ["labs/tools/labs"] = "LTOL"; ["labs/tools/WMT"] = "TWMT"; ["labs/tools/bub"] = "TBUB"; ["labs/tools/connectivity"] = "TCON"; ["labs/tools/coursestats"] = "TCST"; ["labs/tools/extdist"] = "TEXD"; ["labs/tools/gblrenamemon"] = "TGRM"; ["labs/tools/giftbot"] = "TGFT"; ["labs/tools/grrrit"] = "TGRT"; ["labs/tools/guc"] = "TGUC"; ["labs/tools/heritage"] = "THER"; ["labs/tools/kirstentest"] = "TKIT"; ["labs/tools/lists"] = "TLST"; ["labs/tools/maintgraph"] = "TMTG"; ["labs/tools/multichill"] = "TMUC"; ["labs/tools/pywikibugs"] = "TPYW"; ["labs/tools/signpost"] = "TSGN"; ["labs/tools/wikicaptcha"] = "TWCA"; ["labs/tools/wikipedia-android-builds"] = "TWAB"; ["labs/tools/wikiviewstats"] = "TWVS"; ["phabricator-Tools"] = "PHTO"; ["operations/dns"] = "ODNS"; ["VisualEditor/VisualEditor"] = "GVED"; ["MicrosoftWebPlatformInstaller"] = "MWPI"; ["FastStringSearch"] = "MFSS"; ["NativePreprocessor"] = "MNPP"; ["php/luasandbox"] = "MLUS"; ["php/normal"] = "MNOR"; ["php/wikidiff"] = "MWDI"; ["php/wikidiff2"] = "MWDJ"; ["php/wmerrors"] = "MWME"; ["RCSub"] = "MRCS"; ["mediawiki-ruby-api"] = "MRUB"; ["mediawiki-selenium"] = "MSEL"; ["bundles"] = "MBUN"; ["code-utils"] = "MCUT"; ["codesniffer"] = "MCSN"; ["commonshelper2"] = "MCHT"; ["fluoride"] = "MFLU"; ["grabbers"] = "MGRA"; ["missing-from-wikipedia"] = "MMFW"; ["MediaWiki Release Tools"] = "MREL"; ["RelEng"] = "MREN"; ["scap"] = "MSCA"; ["upload"] = "MUPL"; ["mediawiki/vagrant"] = "MWVA"; ["mediawiki/vendor"] = "MWVD"; ["oojs"] = "GOJS"; ["oojs/core"] = "GOJS"; ["oojs/ui"] = "GOJU"; ["openstack-wikistatus"] = "GOSW"; ["openzim"] = "GOZI"; ["operations/apache-config"] = "OAPA"; ["operations/debs"] = "ODAA"; ["operations/debs/StatsD"] = "ODAB"; ["operations/debs/adminbot"] = "ODAC"; ["operations/debs/archiva"] = "ODAD"; ["operations/debs/check_ganglia"] = "ODAE"; ["operations/debs/contenttranslation"] = "ODAF"; ["operations/debs/contenttranslation-apertium"] = "ODAG"; ["operations/debs/contenttranslation-apertium-apy"] = "ODAH"; ["operations/debs/contenttranslation-apertium-br-fr"] = "ODAI"; ["operations/debs/contenttranslation-apertium-en-ca"] = "ODAJ"; ["operations/debs/contenttranslation-apertium-en-es"] = "ODAK"; ["operations/debs/contenttranslation-apertium-es-ca"] = "ODAL"; ["operations/debs/contenttranslation-apertium-es-pt"] = "ODAM"; ["operations/debs/contenttranslation-apertium-fr-ca"] = "ODAN"; ["operations/debs/contenttranslation-apertium-fr-es"] = "ODAO"; ["operations/debs/contenttranslation-apertium-lex-tools"] = "ODAP"; ["operations/debs/contenttranslation-apertium-pt-ca"] = "ODAQ"; ["operations/debs/contenttranslation-apertium-sv-da"] = "ODAR"; ["operations/debs/contenttranslation-cg3"] = "ODAS"; ["operations/debs/contenttranslation-lttoolbox"] = "ODAT"; ["operations/debs/etherpad-lite"] = "ODAU"; ["operations/debs/flask-login"] = "ODAV"; ["operations/debs/ganglia"] = "ODAW"; ["operations/debs/git-deploy"] = "ODAX"; ["operations/debs/git-fat"] = "ODAY"; ["operations/debs/hhvm"] = "ODAZ"; ["operations/debs/ircd-ratbox"] = "ODBA"; ["operations/debs/ircecho"] = "ODBB"; ["operations/debs/jenkins-debian-glue"] = "ODBC"; ["operations/debs/jmxtrans"] = "ODBD"; ["operations/debs/kafka"] = "ODBE"; ["operations/debs/kafkacat"] = "ODBF"; ["operations/debs/latexml"] = "ODBG"; ["operations/debs/libanon"] = "ODBH"; ["operations/debs/libav"] = "ODBI"; ["operations/debs/librsvg"] = "ODBJ"; ["operations/debs/libvpx"] = "ODBK"; ["operations/debs/logstash-gelf"] = "ODBL"; ["operations/debs/logster"] = "ODBM"; ["operations/debs/lucene-search-2"] = "ODBN"; ["operations/debs/mariadb-server"] = "ODBO"; ["operations/debs/memkeys"] = "ODBP"; ["operations/debs/mod_tile"] = "ODBR"; ["operations/debs/mwbzutils"] = "ODBS"; ["operations/debs/mysqlatfacebook"] = "ODBT"; ["operations/debs/nginx"] = "ODBU"; ["operations/debs/nodejs"] = "ODBV"; ["operations/debs/osm-mapnik-style"] = "ODBW"; ["operations/debs/osm2pgsql"] = "ODBX"; ["operations/debs/phantomjs"] = "ODBY"; ["operations/debs/php/mailparse"] = "ODBZ"; ["operations/debs/puppet"] = "ODCA"; ["operations/debs/pybal"] = "ODCB"; ["operations/debs/python-diamond"] = "ODCC"; ["operations/debs/python-flask-login"] = "ODCD"; ["operations/debs/python-gear"] = "ODCE"; ["operations/debs/python-jsonschema"] = "ODCF"; ["operations/debs/python-kafka"] = "ODCG"; ["operations/debs/python-phabricator"] = "ODCH"; ["operations/debs/python-statsd"] = "ODCI"; ["operations/debs/quickstack"] = "ODCJ"; ["operations/debs/rt-authen-externalauth"] = "ODCK"; ["operations/debs/ruby-dimensions"] = "ODCL"; ["operations/debs/ruby-execjs"] = "ODCM"; ["operations/debs/ruby-jsduck"] = "ODCN"; ["operations/debs/ruby-parallel"] = "ODCO"; ["operations/debs/sartoris"] = "ODCP"; ["operations/debs/search-qa"] = "ODCQ"; ["operations/debs/squid"] = "ODCR"; ["operations/debs/stud"] = "ODCS"; ["operations/debs/udp2log-log4j-java"] = "ODCT"; ["operations/debs/utfnormal"] = "ODCU"; ["operations/debs/varnish"] = "ODCV"; ["operations/debs/vips"] = "ODCW"; ["operations/debs/wikibugs"] = "ODCX"; ["operations/debs/wikimedia/base"] = "ODCY"; ["operations/debs/wikimedia/job-runner"] = "ODCZ"; ["operations/debs/wikimedia/keyring"] = "ODDA"; ["operations/debs/wikimedia/ldap-tools"] = "ODDB"; ["operations/debs/wikimedia/lvs-realserver"] = "ODDC"; ["operations/debs/wikimedia/search-qa"] = "ODDD"; ["operations/debs/wikimedia/task-appserver"] = "ODDE"; ["operations/debs/wikistats"] = "ODDF"; ["operations/dumps"] = "ODUM"; ["operations/dumps-archiving"] = "ODUA"; ["operations/dumps-incremental"] = "ODUI"; ["operations/dumps-test"] = "ODUT"; ["operations/mediawiki-config"] = "OMWC"; ["operations/mediawiki-multiversion"] = "OMWM"; ["operations/network-diagrams"] = "ONET"; ["operations/puppet/cassandra"] = "OPCA"; ["operations/puppet/cdh"] = "OPCD"; ["operations/puppet/cdh4"] = "OPCF"; ["operations/puppet/jmxtrans"] = "OPJM"; ["operations/puppet/kafka"] = "OPKA"; ["operations/puppet/kafkatee"] = "OPKT"; ["operations/puppet/mariadb"] = "OPMD"; ["operations/puppet/nginx"] = "OPNG"; ["operations/puppet/varnish"] = "OPVA"; ["operations/puppet/varnishkafka"] = "OPVK"; ["operations/puppet/wikimetrics"] = "OPWM"; ["operations/puppet/zookeeper"] = "OPZK"; ["operations/software/elasticsearch-plugins"] = "OSEP"; ["operations/software/ganglia-logtailer"] = "OSGL"; ["operations/software/ganglios"] = "OSGA"; ["operations/software/gdash"] = "OSGD"; ["operations/software/grafana"] = "OSGR"; ["operations/software/hhvm-dev"] = "OSHD"; ["operations/software/hhvm-dev-folly"] = "OSHF"; ["operations/software/hhvm-dev-third-party"] = "OSHT"; ["operations/software/kibana"] = "OSKI"; ["operations/software/librenms"] = "OSLR"; ["operations/software/mwprof"] = "OSMP"; ["operations/software/mwprof-reporter"] = "OSMR"; ["operations/software/otrs"] = "OSOT"; ["operations/software/redactatron"] = "OSRE"; ["operations/software/shinkengen"] = "OSHI"; ["operations/software/swift-ring"] = "OSWI"; ["operations/software/varnish-libvmod-netmapper"] = "OSVL"; ["operations/software/varnish-varnishkafka"] = "OSVV"; ["operations/software/varnish-vhtcpd"] = "OSVH"; ["passport-mediawiki"] = "GPMW"; ["qa/browsertests"] = "GQAB"; ["qrpedia"] = "GQRP"; ["sandbox"] = "GSAN"; ["sartoris"] = "GSAR"; ["search-extra"] = "GSXT"; ["search-highlighter"] = "GSHI"; ["search-repository-swift"] = "GSRS"; ["translatewiki"] = "GTWN"; ["unicodejs"] = "GUJS"; ["user-metrics-2"] = "GUMT"; ["wikimedia/TransparencyReport"] = "WTRR"; ["wikimedia/WikimediaShopTools"] = "WMST"; ["wikimedia/bots-LabsAntiSpamBot"] = "GLAS"; ["wikimedia/bots-WMIB"] = "GWMI"; ["wikimedia/bots-jouncebot"] = "GJOU"; ["wikimedia/communications-WMBlog"] = "WMBL"; ["wikimedia/communications-WP-Victor"] = "WPVI"; ["wikimedia/fundraising/FineDiff"] = "WFID"; ["wikimedia/fundraising/LanguageTag"] = "WFLT"; ["wikimedia/fundraising/LoveMap"] = "WFLM"; ["wikimedia/fundraising/PaymentsListeners"] = "WFPL"; ["wikimedia/fundraising/SmashPig"] = "WFSP"; ["wikimedia/fundraising/SmashPig-vendor"] = "WFSV"; ["wikimedia/fundraising/civicrm"] = "WFCA"; ["wikimedia/fundraising/civicrm/buildkit"] = "WFCB"; ["wikimedia/fundraising/civicrm/buildkit-vendor"] = "WFCC"; ["wikimedia/fundraising/civicrm/buildkit-vendor-totten"] = "WFCD"; ["wikimedia/fundraising/civicrm/buildkit-vendor-totten-amp"] = "WFCE"; ["wikimedia/fundraising/civicrm/buildkit-vendor-totten-git-scan"] = "WFCF"; ["wikimedia/fundraising/crm"] = "WFCG"; ["wikimedia/fundraising/crm-civicrm"] = "WFCH"; ["wikimedia/fundraising/crm-drupal"] = "WFCI"; ["wikimedia/fundraising/crm-drush"] = "WFCJ"; ["wikimedia/fundraising/crm-modules"] = "WFCK"; ["wikimedia/fundraising/crm-modules-dedupe_review"] = "WFCL"; ["wikimedia/fundraising/crm-vendor"] = "WFCM"; ["wikimedia/fundraising/dash"] = "WFDA"; ["wikimedia/fundraising/dash-node_modules"] = "WFDM"; ["wikimedia/fundraising/dash-src"] = "WFDS"; ["wikimedia/fundraising/dash-src-bower_modules"] = "WFDB"; ["wikimedia/fundraising/phpmailer"] = "WFPM"; ["wikimedia/fundraising/slander"] = "WFSL"; ["wikimedia/fundraising/stomp"] = "WFST"; ["wikimedia/fundraising/tools"] = "WFTO"; ["wikimedia/fundraising/tools-DjangoBannerStats"] = "WFTD"; ["wikimedia/fundraising/twig"] = "WFTW"; ["wikimedia/iegreview"] = "WIEG"; ["wikimedia/lobbypop"] = "WLOB"; ["wikimedia/orgchart"] = "WORG"; ["wikimedia/roadmap-updater"] = "WRUP"; ["wikimedia/wikimania-scholarships"] = "WWSC"; ["wikimedia/wlm-api"] = "GWLA"; ["wiktionary-anagrimes"] = "GWAN"; ["winter"] = "GWIN"; ["winter-snowflakes"] = "GWIS"; ["xowa"] = "GXOW"; ["Subversion"] = "SVN"; ["pywikibot/bot-CommonsDelinker"] = "PWCD"; ["pywikibot/bot-catbot"] = "PWCB"; ["pywikibot/bot-drtrigonbot"] = "PWDT"; ["pywikibot/bot-misc"] = "PWMI"; ["pywikibot/bot-ragesossbot"] = "PWRA"; ["pywikibot/compat"] = "PWBO"; ["pywikibot"] = "PWBC"; ["pywikibot/core"] = "PWBC"; ["pywikibot/external-httplib2"] = "PWXH"; ["pywikibot/i18n"] = "PWIN"; ["pywikibot/opencv"] = "PWXO"; ["pywikibot/pycolorname"] = "PWXC"; ["pywikibot/sf-export"] = "PWSE"; ["pywikibot/spelling"] = "PWSP"; ["pywikibot/wiktionary"] = "PWKT"; ["phabricator-Sprint"] = "PHSP"; ["cdb"] = "CDB"; ["extensions"] = "MEXT"; ["operations/software/dbtree"] = "OSDB"; ["operations/software/dropwizard-metrics"] = "OSDM"; ["operations/software/ircyall"] = "OSIY"; ["operations/software/labsdb-auditor"] = "OSLA"; ["operations/software/puppet-compiler"] = "OSPC"; ["operations/software/rescue-pxe"] = "OSPX"; ["operations/software/statsdlb"] = "OSSD"; ["operations/software/swift-utils"] = "OSSU"; ["pywikiapi"] = "PWAP"; ["pywikibot/externals"] = "PWEX"; ["utfnormal"] = "GUTF"; ["wikidata-gremlin"] = "GWDG"; ["wikimedia/annualreport"] = "WANR"; ["wikimedia/education-WikiEduDashboard"] = "WEDD"; ["pywikibot/bots-mjbmrbot"] = "PWBM"; ["mediawiki/skins/Empty"] = "SEMP"; ["mediawiki/skins/Slate"] = "SLAT"; ["mediawiki/skins/Tempo"] = "STEM"; ["mediawiki/skins"] = "SKIN"; ["cxserver"] = "GCIT"; ["cxserver-deploy"] = "GCID"; ["cxserver"] = "GCXS"; ["cxserver-deploy"] = "GCXD"; ["jobrunner"] = "GJOB"; ["mathoid"] = "GMAT"; ["ocg-collection"] = "GOCG"; ["mediawiki/services/parsoid"] = "GPAR"; ["parsoid-deploy"] = "GPAD"; ["restbase-deploy"] = "GRBD"; ["rcstream"] = "GSTR"; ["phabricator-BurnDownCharts"] = "PHBD"; ["mediawiki/services/hierator"] = "GHIE"; ["mediawiki/services/rashomon"] = "GRAS"; ["mediawiki/services/restbase"] = "GRES"; ["mediawiki/services/service-runner"] = "GSER"; ["mediawiki/services/service-template-node"] = "GSTN"; ["mediawiki/services/tardist"] = "GTAR"; ["mediawiki/services/zotero-translation-server"] = "GZTS"; ["mediawiki/services/zotero-translators"] = "GZTT"; ["mediawiki/services/graphoid"] = "GGRA"; ["mediawiki/services/graphoid-deploy"] = "GGRD"; ["php/tidy"] = "MTID"; ["phabricator-Security"] = "PHES"; ["analytics/aggregator"] = "ANAG"; ["analytics/gerrit-stats"] = "ANGS"; ["analytics/gerrit-stats-data"] = "AGSD"; ["analytics/limn-flow-data"] = "ANLF"; ["analytics/limn-language-data"] = "ANLL"; ["analytics/mediawiki-storage"] = "ANMS"; ["analytics/proof-of-concept"] = "ANPC"; ["analytics/statsv"] = "ANSV"; ["analytics/ua-parser"] = "ANUA"; ["analytics/limn-edit-data"] = "ANLD"; ["analytics/abacist"] = "ANBC"; ["analytics/aggregator-data"] = "ANAR"; ["mediawiki/extensions/ApiFeatureUsage"] = "EAFU"; ["mediawiki/extensions/ArticleComments"] = "EACO"; ["mediawiki/extensions/BoilerPlate"] = "EBOP"; ["mediawiki/extensions/Buggy"] = "EBUG"; ["mediawiki/extensions/CollapsibleVector"] = "ECLV"; ["mediawiki/extensions/DonationInterface-vendor"] = "EDIV"; ["mediawiki/extensions/EditAccount"] = "EEDA"; ["mediawiki/extensions/Farmer"] = "EFRM"; ["mediawiki/extensions/Favorites"] = "EFAV"; ["mediawiki/extensions/Gather"] = "EGAT"; ["mediawiki/extensions/GitHub"] = "EGIT"; ["mediawiki/extensions/GoogleAPIClient"] = "EGAC"; ["mediawiki/extensions/GoogleAnalyticsTopPages"] = "EATP"; ["mediawiki/extensions/HitCounters"] = "EHTC"; ["mediawiki/extensions/Html2Wiki"] = "EHTW"; ["mediawiki/extensions/LDAPAuthorization"] = "ELDP"; ["mediawiki/extensions/LinkSuggest2"] = "ELNS"; ["mediawiki/extensions/Link_Attributes"] = "ELNA"; ["mediawiki/extensions/MsCatSelect"] = "EMSC"; ["mediawiki/extensions/MsInsert"] = "EMSI"; ["mediawiki/extensions/MsWikiEditor"] = "EMSE"; ["mediawiki/extensions/MultiBoilerplate"] = "EMBP"; ["mediawiki/extensions/OOUIPlayground"] = "EUIP"; ["mediawiki/extensions/OpenIDConnect"] = "EIDC"; ["mediawiki/extensions/PagesList"] = "EPGL"; ["mediawiki/extensions/PluggableAuth"] = "EPLG"; ["mediawiki/extensions/RestBaseUpdateJobs"] = "ERBU"; ["mediawiki/extensions/RevealEmail"] = "ERVE"; ["mediawiki/extensions/SemanticBreadcrumbLinks"] = "ESBL"; ["mediawiki/extensions/SemanticDependency"] = "ESDP"; ["mediawiki/extensions/SemanticInterlanguageLinks"] = "ESIL"; ["mediawiki/extensions/SimpleSAMLphp"] = "ESAM"; ["mediawiki/extensions/ViewportMetrics"] = "EVPM"; ["mediawiki/extensions/VikiSemanticTitle"] = "EVST"; ["mediawiki/extensions/VikiTitleIcon"] = "EVTI"; ["mediawiki/extensions/VirtualKeyboard"] = "EVTK"; ["mediawiki/extensions/WhosOnline"] = "EWHO"; ["mediawiki/extensions/WikibaseJavaScriptApi"] = "EWBJ"; ["mediawiki/extensions/WikibaseRepository"] = "EWBR"; ["mediawiki/extensions/WikibaseView"] = "EWBV"; ["mediawiki/extensions/WikidataQuality"] = "EWQL"; ["mediawiki/extensions/Cargo"] = "ECRG"; ["mediawiki/extensions/ContributionsList"] = "ECNL"; ["mediawiki/extensions/ContributorsAddon"] = "ECNA"; ["mediawiki/extensions/PaginateText"] = "EPTX"; ["mediawiki/extensions/PlanOut"] = "EPLO"; ["mediawiki/extensions/SemanticMetaTags"] = "ESME"; ["mediawiki/extensions/Sentry"] = "ESNT"; ["labs/tools/SuchABot"] = "TSUB"; ["labs/tools/faces"] = "TFCS"; ["labs/tools/gerrit-to-redis"] = "TGTR"; ["labs/tools/phabricator-bug-status"] = "TPBS"; ["labs/tools/wikibugs2"] = "TWBT"; ["phabricator-extensions"] = "PHEX"; ["test-gerrit-ping"] = "GGTP"; ["wmf-utils"] = "GUTI"; ["mediawiki/tools/Cite4Wiki"] = "MCFW"; ["mediawiki/tools/dippybird"] = "MDIP"; ["mediawiki/tools/mwdumper"] = "MWDU"; ["mediawiki/tools/schroot"] = "MSRT"; ["mediawiki/tools/upload/PhotoUpload"] = "MUPU"; ["phabricator-test"] = "PHTE"; ["openstack-designate"] = "GOSD"; ["sink_nova_fixed_multi"] = "GSNF"; ["sink_nova_ldap"] = "GSNL"; ["operations/debs/avconv10"] = "ODDG"; ["operations/debs/carbon-c-relay"] = "ODDH"; ["operations/debs/contenttranslation-apertium-eo-en"] = "ODDI"; ["operations/debs/contenttranslation-apertium-hbs"] = "ODDJ"; ["operations/debs/contenttranslation-apertium-hbs-eng"] = "ODDK"; ["operations/debs/contenttranslation-apertium-hbs-mkd"] = "ODDL"; ["operations/debs/contenttranslation-apertium-hbs-slv"] = "ODDM"; ["operations/debs/contenttranslation-apertium-hin"] = "ODDN"; ["operations/debs/contenttranslation-apertium-id-ms"] = "ODDO"; ["operations/debs/contenttranslation-apertium-mk"] = "ODDP"; ["operations/debs/contenttranslation-apertium-mk-bg"] = "ODDQ"; ["operations/debs/contenttranslation-apertium-nno"] = "ODDR"; ["operations/debs/contenttranslation-apertium-nno-nob"] = "ODDS"; ["operations/debs/contenttranslation-apertium-nob"] = "ODDT"; ["operations/debs/contenttranslation-apertium-urd"] = "ODDU"; ["operations/debs/contenttranslation-apertium-urd-hin"] = "ODDV"; ["operations/debs/ffmpeg2theorawmf"] = "ODDW"; ["operations/debs/gerrit"] = "ODDX"; ["operations/debs/nutcracker"] = "ODDY"; ["operations/debs/opus"] = "ODDZ"; ["operations/debs/perf-tools"] = "ODEA"; ["operations/debs/statsite"] = "ODEB"; ["operations/debs/txstatsd"] = "ODEC"; ["operations/debs/contenttranslation/apertium-af-nl"] = "ODED"; ["operations/debs/contenttranslation/apertium-dan"] = "ODEE"; ["operations/debs/contenttranslation/apertium-dan-nor"] = "ODEF"; ["operations/debs/contenttranslation/apertium-en-gl"] = "ODEG"; ["operations/debs/contenttranslation/apertium-es-an"] = "ODEH"; ["operations/debs/contenttranslation/apertium-es-ast"] = "ODEI"; ["operations/debs/contenttranslation/apertium-es-gl"] = "ODEJ"; ["operations/debs/contenttranslation/apertium-eu-en"] = "ODEK"; ["operations/debs/contenttranslation/apertium-eu-es"] = "ODEL"; ["operations/debs/contenttranslation/apertium-eus"] = "ODEM"; ["operations/debs/contenttranslation/apertium-kaz"] = "ODEN"; ["operations/debs/contenttranslation/apertium-kaz-tat"] = "ODEO"; ["operations/debs/contenttranslation/apertium-oc-ca"] = "ODEP"; ["operations/debs/contenttranslation/apertium-oc-es"] = "ODEQ"; ["operations/debs/contenttranslation/apertium-pt-gl"] = "ODER"; ["operations/debs/contenttranslation/apertium-tat"] = "ODES"; ["operations/debs/contenttranslation/hfst"] = "ODET"; ["operations/debs/jetty-runner"] = "ODEU"; ["operations/debs/nodepool"] = "ODEV"; ["mediawiki/extensions/LastUserLogin"] = "ELUL"; ["mediawiki/extensions/MadLib"] = "EMLI"; ["mediawiki/extensions/MassAction"] = "EMSA"; ["mediawiki/extensions/RawImageHandler"] = "ERIH"; ["mediawiki/extensions/SafeDelete"] = "ESDL"; ["mediawiki/extensions/WikidataPageBanner"] = "EWDP"; ["mediawiki/extensions/MsCalendar"] = "EMCL"; ["mediawiki/skins/Blueprint"] = "SBLU"; ["gerrit"] = "GGER"; ["labs/tools/Wikidipendenza"] = "TWDI"; ["labs/tools/Faces"] = "TFACES"; ["labs/tools/ptable"] = "TPTAB"; } local p = {} function p.repoToCallsign( frame ) local repo = frame.args[1] return callsigns[repo] end return p 494ef077ac3753140476cb0d9a273c4c33fd2c1d Module:Callsigns/doc 0 95 233 2016-01-06T06:40:44Z Eddie 1 Created page with "This module maps each ''repository path'' in [[Gerrit]] to its "callsign" in [[Diffusion]]. {{tl|git file}} ([[phab:T101358]]) and other templates use it. When you create, re..." wikitext text/x-wiki This module maps each ''repository path'' in [[Gerrit]] to its "callsign" in [[Diffusion]]. {{tl|git file}} ([[phab:T101358]]) and other templates use it. When you create, rename, or reorganize a new repository, you need to update this mapping. Note a repository path is different from the repository name in Diffusion. You see this path in some gerrit URLs, in the "Project ''path/here''" heading on some gerrit pages, and in the "Clone" command in the Diffusion summary. For example, "oojs-ui" in Diffusion has the callsign GOJU, and on the [[phab:diffusion/GOJU]] page its Clone command is <kbd><nowiki>https://</nowiki>gerrit.wikimedia.org/r/p/'''oojs/ui'''</kbd>. So its path is <code>oojs/ui</code>, and this matches the path in gerrit URLs like https://gerrit.wikimedia.org/r/#/projects/oojs/ui,dashboards/default and their "Project" headings. a1a9d77639d4256ac3f51bfd588a8e050e73f1e5 Gerrit 0 96 234 2016-01-06T06:42:14Z Eddie 1 Created page with "<languages /> __NOTOC__ [[File:Gerrit.svg|{{dir|{{pagelang}}|left|right}}|200px]] File:Gerrit.wikimedia.org as seen on 2013-03-05 14 08 23.png|thumb|<translate><!--T:1--> A..." wikitext text/x-wiki <languages /> __NOTOC__ [[File:Gerrit.svg|{{dir|{{pagelang}}|left|right}}|200px]] [[File:Gerrit.wikimedia.org as seen on 2013-03-05 14 08 23.png|thumb|<translate><!--T:1--> A view of open change sets at [<tvar|gerrit>https://gerrit.wikimedia.org</> gerrit.wikimedia.org]</translate>]] {{TNT|Git and Gerrit}} <translate> <!--T:2--> Code review is at the heart of our development process. Any software contribution to [[<tvar|whatis>Special:MyLanguage/Manual:What is MediaWiki?</>|MediaWiki]] or any other Wikimedia hosted project is reviewed and approved at [https://gerrit.wikimedia.org gerrit.wikimedia.org] before being merged to our [[w:Git (software)|Git]] repositories. The tool we use to handle code reviews is [[w:Gerrit_(software)|Gerrit]]. <!--T:3--> All [[<tvar|dev-access>Special:MyLanguage/Developer access</>|Gerrit users]] can review contributions but only [[<tvar|maintainers>Developers/Maintainers</>|maintainers]] have the [[<tvar|plus2>Gerrit/+2</>|special rights]] to approve or reject them. == Getting started == <!--T:4--> <!--T:16--> To quickly get a functioning pre-configured development installation of MediaWiki, including a virtual machine, MediaWiki source code, as well as all prerequisites and (optionally) various extensions, see [[MediaWiki-Vagrant]]. This is the recommended way of getting started with MediaWiki development. <!--T:5--> To simply '''browse & fork our code''' you can use the [<tvar|github>https://github.com/wikimedia</> GitHub mirror]. <!--T:6--> To make an anonymous git clone of core MediaWiki, <tvar|gerrit><kbd>git clone https://gerrit.wikimedia.org/r/p/mediawiki/core.git</kbd></> <!--T:7--> To '''submit your first patch''' check the [[<tvar|tutorial>Gerrit/Tutorial</>|tutorial]] or its [[<tvar|getting-started>Gerrit/Getting started</>|shorter version]]. <!--T:8--> Your '''help reviewing changes''' is welcome! [[<tvar|tutorial>Gerrit/Tutorial#How we review code</>|Learn how]]. == Tutorials & guidelines == <!--T:9--> <!--T:10--> Other useful documentation written for MediaWiki & Wikimedia developers: <!--T:11--> * Setting up [[MediaWiki-Vagrant|Vagrant]] virtual machine development environment. * [[Gerrit/Commit message guidelines|Commit message guidelines]] * [[Gerrit/Code review|Code review guide]] * [[Gerrit/Navigation|Gerrit interface navigation]] * [<tvar|gerrit-index>https://gerrit.wikimedia.org/r/Documentation/index.html</> Gerrit's documentation] * [<tvar|gerrit-search>https://gerrit.wikimedia.org/r/Documentation/user-search.html</> Searching in Gerrit] * [[Gerrit/Advanced usage|Advanced usage]] == Special cases == <!--T:12--> <!--T:13--> * [[Gerrit/New repositories|Requesting new repositories]] * [[Gerrit/Project ownership|Project owners]] * [[Gerrit/+2|Reviewers with merging rights]] == See also == <!--T:14--> <!--T:15--> * [https://gerrit.wikimedia.org/r/#/admin/projects/ List of the public Gerrit projects] * [[wikitech:Gerrit|Technical information about Wikimedia's Gerrit installation]] * [https://phabricator.wikimedia.org/maniphest/task/create/?projects=Gerrit Report bugs/other issues with Gerrit] ** [https://phabricator.wikimedia.org/maniphest/task/create/?projects=Gitblit Report bugs/other issues with the Gitblit web interface at git.wikimedia.org] * [[phab:37497]] - Implement a way to bring GitHub pull requests into Gerrit. ** [[User:Yuvipanda/G2G|G2G]], a set of scripts that make Gerrit / GitHub interoperability possible. ** [https://gist.github.com/yuvipanda/5174162 sync-gerrit.bash] script to move GitHub pull requests to Gerrit Changeset manually ([http://lists.wikimedia.org/pipermail/wikitech-l/2013-March/067665.html discussion]). * [https://tools.wmflabs.org/gerrit-patch-uploader/ Wikimedia Gerrit Patch Uploader] * [[wikitech:grrrit-wm|grrrit-wm]] * [[wikitech:Gerrit Notification Bot|Gerrit Notification Bot]] </translate> [[Category:Gerrit{{translation}}]] [[Category:New contributors{{translation}}]] 4d14acccedca6f2afbc453bc28502f0c7ad6e305 File:Gerrit.wikimedia.org as seen on 2013-03-05 14 08 23.png 6 97 235 2016-01-06T06:43:21Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 236 235 2016-01-06T06:44:10Z Eddie 1 Eddie uploaded a new version of [[File:Gerrit.wikimedia.org as seen on 2013-03-05 14 08 23.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 237 236 2016-01-06T06:46:50Z Eddie 1 Eddie uploaded a new version of [[File:Gerrit.wikimedia.org as seen on 2013-03-05 14 08 23.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Gerrit.svg 6 98 238 2016-01-06T06:48:58Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 239 238 2016-01-06T06:49:35Z Eddie 1 Eddie uploaded a new version of [[File:Gerrit.svg]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Category:Mediawiki.org Formatting templates 14 100 242 241 2016-01-06T06:55:35Z Eddie 1 1 revision imported wikitext text/x-wiki [[Category:Formatting templates]] b0977d99bfd84d652e4508b3691eb776cf54a6dd Template:Grey 10 101 244 243 2016-01-06T06:55:35Z Eddie 1 1 revision imported wikitext text/x-wiki <span style="color:#999;">{{{1}}}</span><noinclude> * See also: {{tl|s}} [[Category:Formatting templates|{{PAGENAME}}]] <templatedata> { "description": "Display text in gray", "params": { "1": { "label": "Text", "description": "Text to be displayed", "type": "string", "default": "text", "suggested": true, "autovalue": "value" } } } </templatedata> </noinclude> 629dd57a007f80942599a00e027948fcedfcb97c Category:Cross-browser compatibility templates 14 102 246 245 2016-01-06T06:55:35Z Eddie 1 1 revision imported wikitext text/x-wiki This category lists all templates that facilitate in cross-browser CSS support. [[Category:Formatting templates]] e44d93c6a7bddb9c36f79fab0f7dadb21bbe1bf0 Template:Phpi 10 103 248 247 2016-01-06T06:55:35Z Eddie 1 1 revision imported wikitext text/x-wiki {{inline-code|{{{1}}}|lang=php}}<noinclude> <templatedata> { "params": { "1": { "label": "Content", "description": "The PHP program code to be displayed.", "type": "string", "required": true } } } </templatedata> [[Category:Formatting templates]] </noinclude> 10be38885e779a372c5765a3b22ba9aaad06850e Template:Jsi 10 104 250 249 2016-01-06T06:55:35Z Eddie 1 1 revision imported wikitext text/x-wiki {{inline-code|{{{1}}}|lang=javascript}}<noinclude> Invokes {{tl|inline-code}} with <code>lang=javascript</code> [[Category:Formatting templates]]</noinclude> 5830e6fb23f49e101e38b7861f4daa0304a55e40 Template:Inline-code 10 105 252 251 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki {{#tag:syntaxhighlight|{{{1|input}}}|lang={{{lang|php}}}|enclose=none}}<noinclude> == Usage == : Some text, then <nowiki>{{Inline-code | 1=wfDebug( $text, $dest = 'all' );}}</nowiki> and more text. produces :Some text, then {{Inline-code | 1=wfDebug( $text, $dest = 'all' );}} and more text. [[Category:Formatting templates]]</noinclude> b60139d46d6d072f26f3ea63670145f9b31a9fe6 Template:S 10 106 254 253 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <span style="text-decoration:line-through; color:#999">{{{1|striked text}}}</span><noinclude> * See also: {{tl|grey}} [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 8e444119abfd7aa3c1cdc49424b59145293dabd4 Template:Green 10 107 256 255 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <span style="color:green">{{{1}}}</span><noinclude> [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 5fce00bbe0789ccf092ee46ffbef5e1c16127e2f Template:Red 10 108 258 257 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <span style="color:#BA0000">{{{1}}}</span><noinclude> [[Category:Formatting templates|{{PAGENAME}}]] </noinclude> 679ceced3c067adf7b211de86ff810db7cd49c55 Template:Blue 10 109 260 259 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <noinclude> {{languages}} </noinclude><span style="color:#0645AD;">{{{1}}}</span><noinclude> [[Category:Formatting templates{{translation}}|{{PAGENAME}}]] </noinclude> 3300263cd97853e64e01cf269e5c1e5cde832838 Template:Collapse top 10 110 262 261 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <noinclude> {{languages}} </noinclude><div style="display:{{{display|block}}};margin-{{dir|{{pagelang}}|right|left}}:{{{indent|0px}}};{{{extrastyle|}}}"><!-- NOTE: width renders incorrectly if added to main STYLE section--> {| <!-- Template:Collapse top --> class="navbox mw-collapsible {{{{{|safesubst:}}}#if:{{{expand|}}}||mw-collapsed}}" style="background: {{{bg1|transparent}}}; text-align: {{dir|{{pagelang}}|right|left}}; border: {{{border|1px}}} solid {{{b-color|silver}}}; margin-top: 0.2em; {{{{{|safesubst:}}}#if:{{{width|}}}|width:{{{width}}};}}" |- ! style="background-color: {{{bg|#F8FCFF}}}; text-align:{{{{{|safesubst:}}}#if:{{{left|}}}|{{dir|{{pagelang}}|right|left}}|center}}; font-size:112%; color: {{{fc|black}}};" | {{{1|{{{title|{{{reason|{{{header|{{{heading|Extended content}}} }}} }}} }}} }}} {{{{{|safesubst:}}}#if:{{{warning|{{{2|}}}}}} |{{{{{|safesubst:}}}!}}- {{{{{|safesubst:}}}!}} style="text-align:center; font-style:italic;" {{{{{|safesubst:}}}!}} {{{2|The following is a closed debate. {{strongbad|Please do not modify it.}} }}} }} |- | style="border: solid {{{border2|1px silver}}}; padding: {{{padding|8px}}}; background-color: {{{bg2|white}}}; font-size:112%;" {{{{{|safesubst:}}}!}}<noinclude> <center>''The following content has been placed in a collapsed box for improved usability.''</center> {{ {{TNTN|Collapse bottom}} }} {{ {{TNTN|Documentation}} }} [[Category:Formatting templates{{translation}}]] </noinclude> 58b88ddc94c40339f599638719179f4058670e35 Template:Documentation 10 84 264 222 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki {{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude> ce7fd93f18c46b4fa871bf679afd05cbda72d8c4 Template:Collapse bottom 10 111 266 265 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki |}</div><noinclude> {{TNT|Documentation}} <!-- PLEASE ADD THIS TEMPLATE'S CATEGORIES AND INTERWIKIS TO THE /doc SUBPAGE, THANKS --> </noinclude> 3e150427ef410d88db3ed21c0539f3e90ee3faab Template:Para 10 112 268 267 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <code class="nowrap" {{#if:{{{plain|}}}|style="border:none;background-color:inherit;color:inherit;"}}>&#124;{{#if:{{{1|}}}|{{{1}}}&#61;}}{{{2|}}}</code><noinclude> {{Documentation}} <!--Categories and interwikis go near the bottom of the /doc subpage.--> </noinclude> 66770157bb51b0aabb5b874e4f1bb8f04c80915c Template:Pagelist 10 113 270 269 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{1}}}}}|{{{1}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{1}}}}}|{{{1}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{2|}}}|{{#if:{{{3|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{2}}}}}|{{{2}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{2}}}}}|{{{2}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{3|}}}|{{#if:{{{4|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{3}}}}}|{{{3}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{3}}}}}|{{{3}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{4|}}}|{{#if:{{{5|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{4}}}}}|{{{4}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{4}}}}}|{{{4}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{5|}}}|{{#if:{{{6|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{5}}}}}|{{{5}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{5}}}}}|{{{5}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{6|}}}|{{#if:{{{7|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{6}}}}}|{{{6}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{6}}}}}|{{{6}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{7|}}}|{{#if:{{{8|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{7}}}}}|{{{7}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{7}}}}}|{{{7}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{8|}}}|{{#if:{{{9|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{8}}}}}|{{{8}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{8}}}}}|{{{8}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{9|}}}|{{#if:{{{10|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{9}}}}}|{{{9}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{9}}}}}|{{{9}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{10|}}}|{{#if:{{{11|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{10}}}}}|{{{10}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{10}}}}}|{{{10}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{11|}}}|{{#if:{{{12|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{11}}}}}|{{{11}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{11}}}}}|{{{11}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{12|}}}|{{#if:{{{13|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{12}}}}}|{{{12}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{12}}}}}|{{{12}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{13|}}}|{{#if:{{{14|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{13}}}}}|{{{13}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{13}}}}}|{{{13}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{14|}}}|{{#if:{{{15|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{14}}}}}|{{{14}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{14}}}}}|{{{14}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{15|}}}|{{#if:{{{16|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{15}}}}}|{{{15}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{15}}}}}|{{{15}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{16|}}}|{{#if:{{{17|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{16}}}}}|{{{16}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{16}}}}}|{{{16}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{17|}}}|{{#if:{{{18|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{17}}}}}|{{{17}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{17}}}}}|{{{17}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{18|}}}|{{#if:{{{19|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{18}}}}}|{{{18}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{18}}}}}|{{{18}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{19|}}}|{{#if:{{{20|}}}|,|<nowiki> </nowiki>and}} {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{19}}}}}|{{{19}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{19}}}}}|{{{19}}}]]}}{{{edelim|{{{delim|}}}}}}<!-- -->{{#if:{{{20|}}}|<nowiki> </nowiki>and {{{delim|}}}{{#ifeq:{{{nspace|}}}|default|[[:{{FULLPAGENAME:{{{20}}}}}|{{{20}}}]]|[[:{{{nspace|{{NAMESPACE}}}}}:{{PAGENAME:{{{20}}}}}|{{{20}}}]]}}{{{edelim|{{{delim|}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}}<!-- --></includeonly><noinclude> {{documentation}} <!-- PLEASE ADD CATEGORIES AND INTERWIKIS TO THE /doc SUBPAGE, THANKS --> </noinclude> b956a9df1246a29c44995c86ca9daee3c4830035 Template:Dummytab 10 114 272 271 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <noinclude><table><tr></noinclude><td style="width: {{#if:{{{tab spacing percent|}}}|{{#expr:{{{tab spacing percent}}}/2}}|1}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #A3B1BF}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td><noinclude></tr></table>{{doc|content= This template is used with {{tl|start tab}} to offset the first and last tabs from the end of the tab bar slightly. [[Category:Formatting templates]] }}</noinclude> 3bda72d47644a9d5c168c612904ba7fd70a1650b Template:Cartella 10 115 274 273 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki {| style="width:100%; margin-bottom:.5em; font-size:95%; text-align:left; padding:-2px; background:none" cellpadding="0" cellspacing="0" <!-- 1 --> | rowspan="2" nowrap="nowrap" width="1%" height="37px" valign="top" style="background:#FFF; border:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-bottom:0; padding:0; padding-right:1em; margin:0; {{border-radius|0 1em 0 0}}" | [[File:cartella_{{#switch:{{{1|}}}|blu=blu|grigio=grigia|verde=verde|viola=viola|arancione=arancione|rosso=rossa|blu}}.jpg|link=|Background]] <div style="margin-top:-31px; padding-left:12px">[[File:{{{logo|Nuvola apps kalzium.svg}}}|{{{px|22}}}px]]</div><div style="padding-left:43px; margin-top:-{{{heightpx|{{#expr:{{{px|22}}} + 4}}}}}px; font-size:130%">'''{{{titolo}}}'''</div> <!-- 2 --> | height="10px" | |- <!-- 3 --> | class="plainlinks" valign="bottom" style="border-bottom:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; text-align:center"| {{#if:{{{link|}}}|<div style="float:left; padding:0 .5em 0 .5em; {{border-radius|0 5em 0 0}} border:1px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-left:0; border-bottom:0; background:#{{#switch:{{{1|}}}|blu=ECF5FF|grigio=E3E3E3|verde=CEF2E0|viola=EAEAFF|arancione=FFE9D2|rosso=FFD1D1|ECF5FF}}; font-size:85%"> [{{fullurl:{{{link}}}|action=edit}} edit]|<div style="width:100%;">&nbsp;</div>}} </div> |- <!-- 4 --> | colspan="2" style="padding-left:.5em; padding-right:.5em; background:#FFF; border:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|ABCDEF}}; border-top:0; border-bottom:0" | {{{contenuto}}} |- <!-- 5 --> | colspan="2" class="radius_bottom" style="background:#{{#switch:{{{1|}}}|blu=ECF5FF|grigio=E3E3E3|verde=CEF2E0|viola=EAEAFF|arancione=FFE9D2|rosso=FFD1D1|FFE9D2}}; height:8px; border:1px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}; border-right:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}; border-left:2px solid #{{#switch:{{{1|}}}|blu=ABCDEF|grigio=CCC|verde=A3BFB1|viola=C2D3FC|arancione=FFBC79|rosso=F26C6C|FFBC79}}" | <div style="font-size:0">[[File:pix.gif|1px]]</div> |}<noinclude> {{Documentation}}</noinclude> cbf5ed0933ca88b3af094b63574c28917ef468c0 Template:Start tab 10 116 276 275 2016-01-06T06:55:36Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly><!-- --><table width="100%" cellspacing=0 cellpadding=0 valign="top" border=0 style="background-color: transparent"><!-- --><tr><!-- -->{{dummytab|border={{{border|}}}|tab spacing percent={{{tab spacing percent|}}}}}<!-- -->{{#if:{{{tab-1|}}}|{{tab|freeform={{{freeform-1|}}}|link={{{link-1}}}|link2={{{link2-1}}}|link3={{{link3-1}}}|link4={{{link4-1}}}|link5={{{link5-1}}}|tab={{{tab-1}}}|image={{{image-1|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-1|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}|preums=1}}}}<!-- -->{{#if:{{{tab-2|}}}|{{tab|freeform={{{freeform-2|}}}|link={{{link-2}}}|link2={{{link2-2}}}|link3={{{link3-2}}}|link4={{{link4-2}}}|link5={{{link5-2}}}|tab={{{tab-2}}}|image={{{image-2|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-2|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-3|}}}|{{tab|freeform={{{freeform-3|}}}|link={{{link-3}}}|link2={{{link2-3}}}|link3={{{link3-3}}}|link4={{{link4-3}}}|link5={{{link5-3}}}|tab={{{tab-3}}}|image={{{image-3|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-3|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-4|}}}|{{tab|freeform={{{freeform-4|}}}|link={{{link-4}}}|link2={{{link2-4}}}|link3={{{link3-4}}}|link4={{{link4-4}}}|link5={{{link5-4}}}|tab={{{tab-4}}}|image={{{image-4|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-4|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-5|}}}|{{tab|freeform={{{freeform-5|}}}|link={{{link-5}}}|link2={{{link2-5}}}|link3={{{link3-5}}}|link4={{{link4-5}}}|link5={{{link5-5}}}|tab={{{tab-5}}}|image={{{image-5|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-5|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-6|}}}|{{tab|freeform={{{freeform-6|}}}|link={{{link-6}}}|link2={{{link2-6}}}|link3={{{link3-6}}}|link4={{{link4-6}}}|link5={{{link5-6}}}|tab={{{tab-6}}}|image={{{image-6|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-6|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-7|}}}|{{tab|freeform={{{freeform-7|}}}|link={{{link-7}}}|link2={{{link2-7}}}|link3={{{link3-7}}}|link4={{{link4-7}}}|link5={{{link5-7}}}|tab={{{tab-7}}}|image={{{image-7|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-7|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-8|}}}|{{tab|freeform={{{freeform-8|}}}|link={{{link-8}}}|link2={{{link2-8}}}|link3={{{link3-8}}}|link4={{{link4-8}}}|link5={{{link5-8}}}|tab={{{tab-8}}}|image={{{image-8|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-8|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-9|}}}|{{tab|freeform={{{freeform-9|}}}|link={{{link-9}}}|link2={{{link2-9}}}|link3={{{link3-9}}}|link4={{{link4-9}}}|link5={{{link5-9}}}|tab={{{tab-9}}}|image={{{image-9|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-9|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-10|}}}|{{tab|freeform={{{freeform-10|}}}|link={{{link-10}}}|link2={{{link2-10}}}|link3={{{link3-10}}}|link4={{{link4-10}}}|link5={{{link5-10}}}|tab={{{tab-10}}}|image={{{image-10|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-10|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-11|}}}|{{tab|freeform={{{freeform-11|}}}|link={{{link-11}}}|link2={{{link2-11}}}|link3={{{link3-11}}}|link4={{{link4-11}}}|link5={{{link5-11}}}|tab={{{tab-11}}}|image={{{image-11|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-1|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-12|}}}|{{tab|freeform={{{freeform-12|}}}|link={{{link-12}}}|link2={{{link2-12}}}|link3={{{link3-12}}}|link4={{{link4-12}}}|link5={{{link5-12}}}|tab={{{tab-12}}}|image={{{image-12|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-2|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-13|}}}|{{tab|freeform={{{freeform-13|}}}|link={{{link-13}}}|link2={{{link2-13}}}|link3={{{link3-13}}}|link4={{{link4-13}}}|link5={{{link5-13}}}|tab={{{tab-13}}}|image={{{image-13|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-3|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-14|}}}|{{tab|freeform={{{freeform-14|}}}|link={{{link-14}}}|link2={{{link2-14}}}|link3={{{link3-14}}}|link4={{{link4-14}}}|link5={{{link5-14}}}|tab={{{tab-14}}}|image={{{image-14|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-4|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-15|}}}|{{tab|freeform={{{freeform-15|}}}|link={{{link-15}}}|link2={{{link2-15}}}|link3={{{link3-15}}}|link4={{{link4-15}}}|link5={{{link5-15}}}|tab={{{tab-15}}}|image={{{image-15|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-5|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-16|}}}|{{tab|freeform={{{freeform-16|}}}|link={{{link-16}}}|link2={{{link2-16}}}|link3={{{link3-16}}}|link4={{{link4-16}}}|link5={{{link5-16}}}|tab={{{tab-16}}}|image={{{image-16|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-6|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-17|}}}|{{tab|freeform={{{freeform-17|}}}|link={{{link-17}}}|link2={{{link2-17}}}|link3={{{link3-17}}}|link4={{{link4-17}}}|link5={{{link5-17}}}|tab={{{tab-17}}}|image={{{image-17|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-7|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-18|}}}|{{tab|freeform={{{freeform-18|}}}|link={{{link-18}}}|link2={{{link2-18}}}|link3={{{link3-18}}}|link4={{{link4-18}}}|link5={{{link5-18}}}|tab={{{tab-18}}}|image={{{image-18|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-8|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-19|}}}|{{tab|freeform={{{freeform-19|}}}|link={{{link-19}}}|link2={{{link2-19}}}|link3={{{link3-19}}}|link4={{{link4-19}}}|link5={{{link5-19}}}|tab={{{tab-19}}}|image={{{image-19|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-9|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{#if:{{{tab-20|}}}|{{tab|freeform={{{freeform-20|}}}|link={{{link-20}}}|link2={{{link2-20}}}|link3={{{link3-20}}}|link4={{{link4-20}}}|link5={{{link5-20}}}|tab={{{tab-20}}}|image={{{image-20|}}}|{{{tab-1}}}|{{{tab-2}}}|{{{tab-3}}}|{{{tab-4}}}|{{{tab-5}}}|{{{tab-6}}}|{{{tab-7}}}|{{{tab-8}}}|{{{tab-9}}}|{{{tab-10}}}|{{{tab-11}}}|{{{tab-12}}}|{{{tab-13}}}|{{{tab-14}}}|{{{tab-15}}}|{{{tab-16}}}|{{{tab-17}}}|{{{tab-18}}}|{{{tab-19}}}|{{{tab-20}}}|rounding={{{rounding|}}}|border={{{border|}}}|off tab color={{{off tab color-10|{{{off tab color|}}}}}}|on tab color={{{on tab color|}}}|tab spacing percent={{{tab spacing percent|}}}|font-size={{{tab font-size|}}}|tab alignment={{{tab alignment|}}}|nowrap={{{nowrap|}}}}}}}<!-- -->{{dummytab|border={{{border|}}}|tab spacing percent={{{tab spacing percent|}}}}}<!-- --></tr><!-- --></table><!-- -->{{#ifeq:{{{frame|}}}|yes|<div style="border: {{{border|solid 1px #a3b1bf}}}; padding: .5em 1em 1em 1em; border-top: none; background-color: {{{frame color|{{{on tab color|transparent}}}}}}; color: black; zoom: 1"><!-- --><div style="padding: 1ex">}}<!-- --></includeonly><!-- --><noinclude>{{documentation}}</noinclude> e76d923db135374f739db247717039ec4e689162 Template:End tab 10 117 278 277 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <div><includeonly><!-- -->{{clear}}</div><!-- -->{{#if:{{{URL-1|}}}|<div style="float:right; margin-top: 0.0em; margin-bottom:3px; background-color: {{{Off tab color|#cee0f2}}}; padding: .2em .6em; font-size: 130%; border: {{{border|1px solid #a3b1bf}}}; {{#if:{{{rounding|}}}|-moz-border-radius: {{{rounding}}} {{{rounding}}} 0 0; border-radius: {{{rounding}}} {{{rounding}}} 0 0;}}"> Next page : {{#switch:{{FULLPAGENAME}}| {{{URL-1}}}=[[{{{URL-2|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-2|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-2}}}=[[{{{URL-3|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-3|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-3}}}=[[{{{URL-4|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-4|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-4}}}=[[{{{URL-5|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-5|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-5}}}=[[{{{URL-6|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-6|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-6}}}=[[{{{URL-7|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-7|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-7}}}=[[{{{URL-8|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-8|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-8}}}=[[{{{URL-9|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-9|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-9}}}=[[{{{URL-10|{{{URL-End|{{{URL-1}}}}}}}}}|'''{{{Tab-10|{{{Tab-End|{{{Tab-1}}}}}}}}}''']]| {{{URL-10}}}=[[{{{URL-End|{{{URL-1}}}}}}|'''{{{Tab-End|{{{Tab-1}}}}}}''']]| }}<span style="font-size: larger; font-weight: bold;">&rarr;</span><!-- --><div style="clear:both"></div></div>|<div style="clear:both"></div>}}</div></includeonly><noinclude>{{doc}}</noinclude> d76a781f167cc46cbbe3bf964b551218821e865e Template:Tab 10 118 280 279 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{{#if:{{{preums|}}}||<td style="width: {{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td>}}<td style="text-align: {{#if:{{{tab alignment|}}}|{{{tab alignment}}}|center}}; {{#if:{{{rounding|}}}|{{border-radius|{{{rounding}}} {{{rounding}}} 0 0}}}} padding:0.3em; border: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}; font-size: {{#if:{{{font-size|}}}|{{{font-size}}}|110%}}; {{#switch:{{FULLPAGENAME}}|{{{link}}}|{{{link2}}}|{{{link3}}}|{{{link4}}}|{{{link5}}}=background-color: {{#if:{{{on tab color|}}}|{{{on tab color}}}|transparent}}; border-bottom: none; font-weight:bold; |#default=background-color: {{#if:{{{off tab color|}}}|{{{off tab color}}}|#CEE0F2}}; }} {{#ifeq:{{lc:{{{nowrap|}}}}}|yes|white-space: nowrap;}}" width="{{#expr:(100/{{Number of defined parameters|{{{1}}}|{{{2}}}|{{{3}}}|{{{4}}}|{{{5}}}|{{{6}}}|{{{7}}}|{{{8}}}|{{{9}}}|{{{10}}}|{{{11}}}|{{{12}}}|{{{13}}}|{{{14}}}|{{{15}}}|{{{16}}}|{{{17}}}|{{{18}}}|{{{19}}}|{{{20}}}}})-{{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}}}%">{{#if:{{{image|}}}|[[file:{{{image}}}|20px|{{{tab}}}|link={{{link|}}}]]&nbsp;}}{{#ifeq:{{lc:{{{freeform|}}}}}|yes|{{{tab}}}|[[{{{link}}}|{{{tab}}}]]}}</td></includeonly><noinclude>{{documentation}}</noinclude> d7e78c5489777e489ec4a0320f35ec9c30b7c32e Template:CompactTOC8 10 119 282 281 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki {|<!--======================================================= -- Template CompactTOC8 - (see NOTES at bottom) --======================================================= -- --> id="toc" class="toc" summary="Contents" {{ <!-- ----------------------------------- Check center/right--> #ifeq:{{{center|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|align="center"|}}{{#ifeq:{{{right|}}}|yes|align="right"|}} {{ <!--see NOTE I3 below--> <!-- ----------------------------------- Check name/side--> #ifeq:{{{name|}}}|no||! {{{name|{{MediaWiki:Toc}}}}}{{#ifeq:{{{side|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|&#58;|}} {{#ifeq:{{{side|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|{{!}}|{{!}}-}}}} |{{#ifeq:{{{nobreak|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes||<div style="text-align:{{{align|left}}};">}}{{ <!-- --------------------------------------- Check top --> #ifeq:{{{top|}}}|yes|[[#top{{!}}Top]]&nbsp;{{{sep|&nbsp;}}}|}} {{ <!-- --------------------------------------- Prefix headers-- (see NOTE P2 below) --> #if:{{{pre1|{{{preSec1|}}}}}}|[[{{{pre1link|{{{preSec1link|#{{{pre1|{{{preSec1|}}}}}}}}}}}}{{!}}{{{pre1name|{{{preSec1name|{{{pre1|{{{preSec1|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre2|{{{preSec2|}}}}}}|[[{{{pre2link|{{{preSec2link|#{{{pre2|{{{preSec2|}}}}}}}}}}}}{{!}}{{{pre2name|{{{preSec2name|{{{pre2|{{{preSec2|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre3|{{{preSec3|}}}}}}|[[{{{pre3link|{{{preSec3link|#{{{pre3|{{{preSec3|}}}}}}}}}}}}{{!}}{{{pre3name|{{{preSec3name|{{{pre3|{{{preSec3|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre4|{{{preSec4|}}}}}}|[[{{{pre4link|{{{preSec4link|#{{{pre4|{{{preSec4|}}}}}}}}}}}}{{!}}{{{pre4name|{{{preSec4name|{{{pre4|{{{preSec4|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre5|{{{preSec5|}}}}}}|[[{{{pre5link|{{{preSec5link|#{{{pre5|{{{preSec5|}}}}}}}}}}}}{{!}}{{{pre5name|{{{preSec5name|{{{pre5|{{{preSec5|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre6|{{{preSec6|}}}}}}|[[{{{pre6link|{{{preSec6link|#{{{pre6|{{{preSec6|}}}}}}}}}}}}{{!}}{{{pre6name|{{{preSec6name|{{{pre6|{{{preSec6|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre7|{{{preSec7|}}}}}}|[[{{{pre7link|{{{preSec7link|#{{{pre7|{{{preSec7|}}}}}}}}}}}}{{!}}{{{pre7name|{{{preSec7name|{{{pre7|{{{preSec7|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ #if:{{{pre8|{{{preSec8|}}}}}}|[[{{{pre8link|{{{preSec8link|#{{{pre8|{{{preSec8|}}}}}}}}}}}}{{!}}{{{pre8name|{{{preSec8name|{{{pre8|{{{preSec8|}}}}}}}}}}}}]]&nbsp;{{{sep|&nbsp;}}}|}} {{ <!-- --------------------------------------- Check prebreak--> #if:{{{prebreak|}}}|{{{prebreak}}}}} {{ <!-- --------------------------------------- Check symbols --> #ifeq:{{{sym|}}}|yes|[[#!$@|!$@]]|}} {{ <!-- --------------------------------------- Check numbers --> #ifeq:{{{num|}}}|yes|[[#0–9|0–9]]|}} {{#ifeq:{{{symnum|}}}|yes|[[#!–9|!–9]]| <!-- --------------------------------------- List letters --> }} {{{a|[[#A|A]]}}} {{{b|[[#B|B]]}}} {{{c|[[#C|C]]}}} {{{d|[[#D|D]]}}} {{{e|[[#E|E]]}}} {{{f|[[#F|F]]}}} {{{g|[[#G|G]]}}} {{{h|[[#H|H]]}}} {{{i|[[#I|I]]}}} {{{j|[[#J|J]]}}} {{{k|[[#K|K]]}}} {{{l|[[#L|L]]}}} {{{m|[[#M|M]]}}} {{{n|[[#N|N]]}}} {{{o|[[#O|O]]}}} {{{p|[[#P|P]]}}} {{{q|[[#Q|Q]]}}} {{{r|[[#R|R]]}}} {{{s|[[#S|S]]}}} {{{t|[[#T|T]]}}} {{{u|[[#U|U]]}}} {{{v|[[#V|V]]}}} {{{w|[[#W|W]]}}} {{{x|[[#X|X]]}}} {{{y|[[#Y|Y]]}}} {{{z|[[#Z|Z]]}}} {{#ifeq:{{{nobreak|{{#ifeq:{{{1}}}|short1|yes|}}}}}|yes|&nbsp;|<br />}}{{ <!-- ------------------------------ Check after-header1 - (see NOTE C2 below) --> #if:{{{custom1|{{{Sec1|}}}}}}|[[{{{custom1link|{{{Sec1link|#{{{custom1|{{{Sec1|}}}}}}}}}}}}{{!}}{{{custom1name|{{{Sec1name|{{{custom1|{{{Sec1|}}}}}}}}}}}}]]&nbsp;|}}{{ <!-- ------------------------------ Check after-header2...--> #if:{{{custom2|{{{Sec2|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom2link|{{{Sec2link|#{{{custom2|{{{Sec2|}}}}}}}}}}}}{{!}}{{{custom2name|{{{Sec2name|{{{custom2|{{{Sec2|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom3|{{{Sec3|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom3link|{{{Sec3link|#{{{custom3|{{{Sec3|}}}}}}}}}}}}{{!}}{{{custom3name|{{{Sec3name|{{{custom3|{{{Sec3|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom4|{{{Sec4|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom4link|{{{Sec4link|#{{{custom4|{{{Sec4|}}}}}}}}}}}}{{!}}{{{custom4name|{{{Sec4name|{{{custom4|{{{Sec4|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom5|{{{Sec5|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom5link|{{{Sec5link|#{{{custom5|{{{Sec5|}}}}}}}}}}}}{{!}}{{{custom5name|{{{Sec5name|{{{custom5|{{{Sec5|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom6|{{{Sec6|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom6link|{{{Sec6link|#{{{custom6|{{{Sec6|}}}}}}}}}}}}{{!}}{{{custom6name|{{{Sec6name|{{{custom6|{{{Sec6|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom7|{{{Sec7|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom7link|{{{Sec7link|#{{{custom7|{{{Sec7|}}}}}}}}}}}}{{!}}{{{custom7name|{{{Sec7name|{{{custom7|{{{Sec7|}}}}}}}}}}}}]]&nbsp;|}}{{ #if:{{{custom8|{{{Sec8|}}}}}}|{{{sep|&nbsp;}}} [[{{{custom8link|{{{Sec8link|#{{{custom8|{{{Sec8|}}}}}}}}}}}}{{!}}{{{custom8name|{{{Sec8name|{{{custom8|{{{Sec8|}}}}}}}}}}}}]]&nbsp;|}}{{ <!-- ---------------------------------- Check seealso--> #ifeq:{{{seealso|}}}|yes|{{{sep|&nbsp;}}} [[#See also{{!}}See also]]&nbsp;|}}{{ <!-- ---------------------------------- Check notesfirst--> #ifeq:{{{notesfirst|}}}|yes|{{{sep|&nbsp;}}} [[#Notes{{!}}Notes]]&nbsp;|}}{{ <!-- ---------------------------------- Check refs--> #ifeq:{{{refs|{{#ifeq:{{{1|}}}|short1|yes|}}}}}|yes|{{{sep|&nbsp;}}} [[#References{{!}}References]]&nbsp;|}}{{ <!-- ---------------------------------- Check notes--> #ifeq:{{{notes|}}}|yes|{{{sep|&nbsp;}}} [[#Notes{{!}}Notes]]&nbsp;|}}{{ <!-- ---------------------------------- Further reading--> #ifeq:{{{further|}}}|yes|{{{sep|&nbsp;}}} [[#Further reading{{!}}Further reading]]&nbsp;|}}{{ <!-- ---------------------------------- Check extlinks--> #ifeq:{{{extlinks|}}}|yes|{{{sep|&nbsp;}}} [[#External links{{!}}External links]]|}}{{ <!-- ================================== Check invalid words--> #ifeq:{{{break|x}}}|x||<br> TOC8 - Invalid parameter "break" - try "nobreak=yes". }}{{#ifeq:{{{centre|x}}}|x||<br> TOC8 - Invalid parameter "centre" - try "center=yes". }}{{#ifeq:{{{Top|x}}}|x||<br> TOC8 - Invalid parameter "Top" - try lowercase "top=yes". }}{{#ifeq:{{{ref|x}}}|x||<br> TOC8 - Invalid parameter "ref" - try "refs=yes". }}{{#ifeq:{{{Ref|x}}}|x||<br> TOC8 - Invalid parameter "Ref" - try lowercase "refs=yes". }}{{#ifeq:{{{note|x}}}|x||<br> TOC8 - Invalid parameter "note" - try "note'''s'''=yes". }}{{#ifeq:{{{ext|x}}}|x||<br> TOC8 - Invalid parameter "ext" - try "extlinks=yes". }}{{#ifeq:{{{extlink|x}}}|x||<br> TOC8 - Invalid parameter "extlink" - try "extlinks=yes". }}</div> |}__NOTOC__<noinclude> {{documentation}} <!--PLEASE ADD CATEGORIES & INTERWIKIS TO /doc PAGE, THANKS--> <!-- -- ------------------------------------------------- --NOTES: -- -- NOTE C2: Parameter "custom1=zzz" or "Sec1=zzz" shows first -- subheader "zzz" after the "0-9 A B C D...". -- -- NOTE I3: If-statements can be indented by leaving "{{" at -- end of previous line and put "#if:" on next line; -- otherwise indented lines become quote-boxes. -- -- NOTE P2: Parameter "pre1=xxx" shows first subheader "xxx" -- before the condensed "0-9 A B C..." appears. -- -- NOTE S2: Parameter "sep=&middot;" defines the separator -- string displayed between subheaders (not letters). -- It defaults to a single space, "sep=&nbsp;". -- -- NOTE V9: Coded for MediaWiki language 1.11.1 (Jan.2008); -- wiki-format now omits HTML comments on web xfer. --HISTORY: -- 10Jan09 Added parameters: sep=&middot; and prebreak=<br>. -- 10Jan09 Added parameters: 3 more custom6, custom7, custom8. -- 10Jan09 Added parameters: 3 more custom6link...custom8link. -- 10Jan09 Added parameters: 3 more custom6name...custom8name. -- 10Jan09 Added parameters: pre1, pre2, pre3... pre7, pre8. -- 10Jan09 Added parameters: pre1link, pre2link ... pre8link. -- 10Jan09 Added parameters: pre1name, pre2name ... pre8name. -- 10Jan09 Added parameters: preSec1, preSec2, ... preSec8. -- 10Jan09 Spot invalid keywords: Top/ref/Ref/note/ext etc. -- 10Jan09 Added NOTES comments to explain template coding. -- 10Jan09 Added HISTORY comments to log major changes. -- 01Jul11 Added Further reading -- [These comment lines are omitted before Internet transfer.] -- --End Template:CompactTOC8--> {{Languages}} </noinclude> 19bf5d824ad4f112de95d6e7d3418e8e479dec71 Template:Rellink 10 120 284 283 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <div class="rellink mw-tpl-rellink{{#if:{{{extraclasses|}}}|<nowiki> </nowiki>{{{extraclasses}}}}}">{{{1}}}</div><noinclude> {{documentation}} </noinclude> eb9f18d0972fa390e07dd7bbb6db1cd7ac44d352 Template:Navbox 10 121 286 285 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{{#invoke:Navbox|navbox}}</includeonly><noinclude> {{Documentation}} </noinclude> fe9b964401f895918ee4fe078678f1722a3c41ec Template:Navbar 10 99 288 240 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <span class="noprint plainlinks navbar" style="{{{style|}}}"><small><!-- -->{{#if:{{{mini|}}}{{{plain|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">{{{text|This box:}}} </span>}}<!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#91;</span>}}<!-- --><span style="white-space:nowrap;word-spacing:-.12em;"><!-- -->[[{{ns:10}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="View this template"><!-- -->{{#if:{{{mini|}}}|v|view}}</span>]]<!-- --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[[{{ns:11}}:{{{1}}}|<span style="{{{fontstyle|}}}" title="Discuss this template"><!-- -->{{#if:{{{mini|}}}|d|talk}}</span>]]<!-- -->{{#if:{{{noedit|}}}|<!--nothing-->|<!--else: --><span style="{{{fontstyle|}}}">&#32;<b>&middot;</b>&#32;</span><!-- -->[{{fullurl:{{ns:10}}:{{{1}}}|action=edit}} <span style="{{{fontstyle|}}}" title="Edit this template"><!-- -->{{#if:{{{mini|}}}|e|edit}}</span>]}}<!-- --></span><!-- -->{{#if:{{{brackets|}}}|<span style="{{{fontstyle|}}}">&#93;</span>}}<!-- --></small></span> <noinclude>{{doc}}</noinclude> 08cf4451d76bbca3ac4337d6976839bb230b2c9a Template:Transclude 10 122 290 289 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki {{#switch: {{NAMESPACE: {{{1}}} }} |#default = {{FULLPAGENAME: {{{1}}} }} <!-- eg "User:Foo" --> |{{ns:0}} = {{#ifeq: {{NAMESPACE: {{{1}}} }} | {{NAMESPACE: Template{{{1}}} }} | Template:{{{1}}} <!-- no leading colon, eg "Foo" --> | {{PAGENAME: {{{1}}} }} <!-- leading colon, eg ":Foo", so we want the article --> }} }}<noinclude> {{documentation}} </noinclude> d0239e71e5745cd0d4efd032cee07341e111376b Template:Magnify icon 10 123 292 291 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <div class="magnify">[[File:Magnify-clip.png|15x13px|link={{{link}}}|alt=|Enlarge]]</div><noinclude> {{documentation}} </noinclude> ec1af95c57fa159203d3904a66a4890f70f4791b Template:Documentation/sandbox 10 124 294 293 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki {{#invoke:documentation|main|_content={{ {{#invoke:documentation|contentTitle}}}}}}<noinclude> <!-- Categories go on the /doc subpage, and interwikis go on Wikidata. --> </noinclude> ce7fd93f18c46b4fa871bf679afd05cbda72d8c4 Template:Box-round 10 125 296 295 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki __NOEDITSECTION__ __NOTOC__<div style="clear: both;"></div> <div style="border: 1px solid {{{border|#99c}}};<!-- -->background: {{{titlebackground|#ccf}}};<!-- -->color: {{{titleforeground|#000}}};<!-- -->padding: .1em;<!-- -->text-align: center;<!-- -->font-weight: bold;<!-- -->font-size: 100%;<!-- -->margin-bottom: 0px;<!-- -->border-bottom: none;<!-- -->{{border-radius|1.5em 1.5em 0 0}}<!-- -->{{{titlestyle|}}};"><!-- --><span class="plainlinks" <!-- EDIT LINK PARAMETERS -->style="float:right;<!-- -->margin-bottom:.1em;<!-- -->font-size: 80%;<!-- -->padding-right: 0.5em;"><!-- --><font color="{{{titleforeground|#000000}}}">[{{fullurl:{{{editpage|{{FULLPAGENAME}}}}}|action=edit}} {{int:editsection}}]</font>&nbsp;<!-- --></span ><!-- --><h2 style="font-size:100%;font-weight:bold;border: none; margin: 0; padding:0; padding-bottom:.1em;"><font color="{{{titleforeground|#000000}}}">{{{title}}}</font></h2></div> <div style="display: block; border: 1px solid {{{border|#99c}}}; vertical-align: top; background: {{{background|#fff}}}; color: {{{foreground|#000}}}; margin-bottom: 10px; padding: .8em 1em 1em 1.3em; margin-top: 0em; {{border-radius|0 0 1.5em 1.5em}} {{{style|}}};">{{{1|{{{text|{{{content}}}}}}}}}</div> <noinclude>{{doc}}</noinclude> 1dcefd534a80e840f0eeb69bfa4b352fd3d0b1d5 Template:Tab/sandbox 10 126 298 297 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{{#if:{{{preums|}}}||<td style="width: {{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}%; border-bottom: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}">{{#if:{{{tab spacing percent|}}}||&nbsp;}}</td>}}<td style="text-align: {{#if:{{{tab alignment|}}}|{{{tab alignment}}}|center}}; {{#if:{{{rounding|}}}|{{border-radius|{{{rounding}}} {{{rounding}}} 0 0}}}} padding:0.3em; border: {{#if:{{{border|}}}|{{{border}}}|solid 1px #a3b1bf}}; font-size: {{#if:{{{font-size|}}}|{{{font-size}}}|110%}}; {{#switch:{{FULLPAGENAME}}|{{{link}}}|{{{link2}}}|{{{link3}}}|{{{link4}}}|{{{link5}}}=background-color: {{#if:{{{on tab color|}}}|{{{on tab color}}}|transparent}}; border-bottom: none; font-weight:bold; |#default=background-color: {{#if:{{{off tab color|}}}|{{{off tab color}}}|#CEE0F2}}; }} {{#ifeq:{{lc:{{{nowrap|}}}}}|yes|white-space: nowrap;}}" width="{{#expr:(100/{{Number of defined parameters|{{{1}}}|{{{2}}}|{{{3}}}|{{{4}}}|{{{5}}}|{{{6}}}|{{{7}}}|{{{8}}}|{{{9}}}|{{{10}}}|{{{11}}}|{{{12}}}|{{{13}}}|{{{14}}}|{{{15}}}|{{{16}}}|{{{17}}}|{{{18}}}|{{{19}}}|{{{20}}}}})-{{#if:{{{tab spacing percent|}}}|{{{tab spacing percent}}}|2}}}}%">{{#if:{{{image|}}}|[[file:{{{image}}}|20px|{{{tab}}}|link={{{link|}}}]]&nbsp;}}{{#ifeq:{{lc:{{{freeform|}}}}}|yes|{{{tab}}}|[[{{{link}}}|{{{tab}}}]]}}</td></includeonly><noinclude>{{documentation}}</noinclude> d7e78c5489777e489ec4a0320f35ec9c30b7c32e Template:ApiParam 10 127 300 299 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>*{{{bullet|}}} <code {{#if:{{{required|}}}|style="font-weight:bold"}}>{{{1|{{{name|}}}}}}</code>{{#if:{{{2|{{{description|}}}}}}|&#58; {{{2|{{{description|}}}}}}}}{{#if:{{{maxallowed|}}}|&#32;No more than {{{maxallowed}}} ({{{maxallowedbot|{{#switch:{{{maxallowed}}}|50=500|500=5000}}}}} for bots) allowed.}}{{#if:{{{type|}}}|&#32;'''Type''': {{{type}}}}}{{#if:{{{values|}}}|&#32;Possible values: {{{values}}}.}}{{#if:{{{default|}}}|&#32;(Default: {{{default}}})}}{{#if:{{{version|}}}|&#32;{{MW version-inline|{{{version}}}+}}}}{{#if:{{{deprecated|}}}|&#32;{{Deprecated-inline|{{{deprecated}}}}}}}{{#if:{{{removed|}}}|&#32;{{ {{TNTN|Removed-inline}} |{{{removed}}}}}}}</includeonly><noinclude> {{ {{TNTN|Documentation}} }} </noinclude> c3ec38a9643cc68da7d82786a2db6192c709f250 Template:Smallcaps 10 128 302 301 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly><span style="font-variant: small-caps">{{{1}}}</span></includeonly><noinclude>{{documentation}}</noinclude> 96dbaf71349f4af78c01cfab7eaa8fd953fa7784 Template:Clear 10 129 304 303 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <div style="clear:{{{1|both}}};"></div><noinclude> {{documentation}} </noinclude> 38bab3e3d7fbd3d6800d46556e60bc6bac494d72 Template:Dir 10 130 306 305 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki {{#switch:{{lc:{{{1|{{int:lang}}}}}}}|ar|arc|arz|azb|bcc|ckb|bqi|dv|fa|fa-af|glk|ha|he|kk-arab|kk-cn|ks|ku-arab|mzn|pnb|prd|ps|sd|ug|ur|ydd|yi={{{2|rtl}}}|{{{3|ltr}}}}}<noinclude>{{documentation}}</noinclude> 7d9c312af67f9eff96e7bdfce0f77cb52ca72aea Template:- 10 131 308 307 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki <br style="clear: {{{1|both}}};" /><noinclude> {{Documentation}}</noinclude> ff24c103813c340e95b3035eab8f1662c8649747 Template:Tl 10 24 310 24 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki &#123;&#123;[[Template:{{{1}}}|{{{1}}}]]&#125;&#125;<noinclude> {{documentation}} <!-- Categories go on the /doc subpage and interwikis go on Wikidata. --> </noinclude> 91be693cd63410db06fc933eddb412ba433564dc Template:Tlx 10 91 312 229 2016-01-06T06:55:37Z Eddie 1 1 revision imported wikitext text/x-wiki {{[[{{#if:{{{SISTER|}}}|{{{SISTER}}}Template|{{ns:Template}}}}:{{{1|Tlx}}}|{{{1|Tlx}}}]]<!-- -->{{#if:{{{2|}}}|&#124;{{{2}}}}}<!-- -->{{#if:{{{3|}}}|&#124;{{{3}}}}}<!-- -->{{#if:{{{4|}}}|&#124;{{{4}}}}}<!-- -->{{#if:{{{5|}}}|&#124;{{{5}}}}}<!-- -->{{#if:{{{6|}}}|&#124;{{{6}}}}}<!-- -->{{#if:{{{7|}}}|&#124;{{{7}}}}}<!-- -->{{#if:{{{8|}}}|&#124;''...''}}}}<noinclude> {{documentation}} </noinclude> 31fa8846f3adf381b3a4943183ffd00c2489a2ff Template:GetFallback 10 132 314 313 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{#switch: {{Uselang|lang={{{1|}}}}} | af | fy | li | nl-informal | vls | zea = nl | arz = ar | be-tarask = be-x-old | be-x-old = be-tarask <!-- same language; be-x-old is used on be-x-old.wikipedia but be-tarask is the preferred code --> | crh-cyrl | crh-latn = crh | ckb | mzn | glk = fa | als | bar | de-formal | de-at | de-ch | frr | ksh = de | hif-deva | hif-latn = hif | ike-cans | ike-latn = ike | kk-arab | kk-cyrl | kk-latn | kk-cn | kk-kz | kk-tr = kk | ku-latn | ku-arab = ku | mg | br | co | frp | ht | ty | wa = fr | nds = nds-nl | nds-nl | pdt = nds | pt-br = pt | ruq-cyrl | ruq-grek | ruq-latn = ruq | sr-ec | sr-el = sr | tg-cyrl | tg-latn = tg | tt-cyrl | tt-latn = tt | vec = it | zh | zh-cn | zh-my | zh-sg = zh-hans | zh-hk | zh-mo | zh-tw = zh-hant | szl | csb = pl | en-gb = en | #default = {{#if: {{{default|}}} | {{{default|}}} | en }} }}<noinclude> {{documentation}} </noinclude> b81791cc126e09f5e9e4c149056a58ba8b929a9d Template:LangSwitch 10 133 316 315 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{{ {{#switch: {{{ {{Uselang|lang={{{lang|}}}}} |}}} | ~ = empty | = {{#switch: {{{ {{GetFallback| {{Uselang|lang={{{lang|}}}}} |default=default}} |}}} | ~ = empty | = {{#switch: {{{ {{GetFallback2| {{Uselang|lang={{{lang|}}}}} |default=default}} |}}} | ~ = empty | = {{#if: {{{default|}}} | default | en }} | #default = {{GetFallback2| {{Uselang|lang={{{lang|}}}}} |default=default}} }} | #default = {{GetFallback| {{Uselang|lang={{{lang|}}}}} |default=default}} }} | #default = {{Uselang|lang={{{lang|}}}}} }} |}}}<noinclude> {{Documentation}} </noinclude> 6276da6db4a231df3efb5b4f4a68cc35dc2b8211 Template:Languages 10 134 318 317 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{nmbox | header = '''[[Project:Language policy|{{Languages/Title|{{SUBPAGENAME}}}}]]''' | text = '''[[{{{1|:{{NAMESPACE}}:{{BASEPAGENAME}}}}}|English]]''' {{Languages/Lang|af|{{{1|}}}| }}{{Languages/Lang|ar|{{{1|}}}| }}{{Languages/Lang|ast|{{{1|}}}| }}{{Languages/Lang|az|{{{1|}}}| }}{{Languages/Lang|bcc|{{{1|}}}| }}{{Languages/Lang|bg|{{{1|}}}| }}{{Languages/Lang|br|{{{1|}}}| }}{{Languages/Lang|bn|{{{1|}}}| }}{{Languages/Lang|bs|{{{1|}}}| }}{{Languages/Lang|ca|{{{1|}}}| }}{{Languages/Lang|cs|{{{1|}}}| }}{{Languages/Lang|da|{{{1|}}}| }}{{Languages/Lang|de|{{{1|}}}| }}{{Languages/Lang|diq|{{{1|}}}| }}{{Languages/Lang|el|{{{1|}}}| }}{{Languages/Lang|eo|{{{1|}}}| }}{{Languages/Lang|es|{{{1|}}}| }}{{Languages/Lang|fa|{{{1|}}}| }}{{Languages/Lang|fi|{{{1|}}}| }}{{Languages/Lang|fr|{{{1|}}}| }}{{Languages/Lang|gl|{{{1|}}}| }}{{Languages/Lang|gu|{{{1|}}}| }}{{Languages/Lang|he|{{{1|}}}| }}{{Languages/Lang|hi|{{{1|}}}| }}{{Languages/Lang|hu|{{{1|}}}| }}{{Languages/Lang|hy|{{{1|}}}| }}{{Languages/Lang|id|{{{1|}}}| }}{{Languages/Lang|io|{{{1|}}}| }}{{Languages/Lang|it|{{{1|}}}| }}{{Languages/Lang|ja|{{{1|}}}| }}{{Languages/Lang|ka|{{{1|}}}| }}{{Languages/Lang|kk|{{{1|}}}| }}<span class="autonym">{{Languages/Lang|km|{{{1|}}}| }}</span>{{Languages/Lang|ko|{{{1|}}}| }}{{Languages/Lang|ksh|{{{1|}}}| }}{{Languages/Lang|kw|{{{1|}}}| }}{{Languages/Lang|la|{{{1|}}}| }}{{Languages/Lang|min|{{{1|}}}| }}{{Languages/Lang|mk|{{{1|}}}| }}{{Languages/Lang|ml|{{{1|}}}| }}<span class="autonym">{{Languages/Lang|mr|{{{1|}}}| }}</span>{{Languages/Lang|ms|{{{1|}}}| }}{{Languages/Lang|nl|{{{1|}}}| }}{{Languages/Lang|no|{{{1|}}}| }}{{Languages/Lang|oc|{{{1|}}}| }}{{Languages/Lang|or|{{{1|}}}| }}{{Languages/Lang|pl|{{{1|}}}| }}{{Languages/Lang|pt|{{{1|}}}| }}{{Languages/Lang|pt-br|{{{1|}}}| }}{{Languages/Lang|ro|{{{1|}}}| }}{{Languages/Lang|ru|{{{1|}}}| }}{{Languages/Lang|si|{{{1|}}}| }}{{Languages/Lang|sk|{{{1|}}}| }}{{Languages/Lang|sl|{{{1|}}}| }}{{Languages/Lang|so|{{{1|}}}| }}{{Languages/Lang|sq|{{{1|}}}| }}{{Languages/Lang|sr|{{{1|}}}| }}{{Languages/Lang|sv|{{{1|}}}| }}{{Languages/Lang|ta|{{{1|}}}| }}{{Languages/Lang|th|{{{1|}}}| }}{{Languages/Lang|tr|{{{1|}}}| }}{{Languages/Lang|uk|{{{1|}}}| }}{{Languages/Lang|vi|{{{1|}}}| }}{{Languages/Lang|yi|{{{1|}}}| }}{{Languages/Lang|yue|{{{1|}}}| }}{{Languages/Lang|zh|{{{1|}}}| }}{{Languages/Lang|zh-hans|{{{1|}}}| }}{{Languages/Lang|zh-hant|{{{1|}}}| }}{{Languages/Lang|zh-tw|{{{1|}}}}}| }}<includeonly>{{#if:{{Languages/Lang|af|{{{1|}}}| }}{{Languages/Lang|ar|{{{1|}}}| }}{{Languages/Lang|ast|{{{1|}}}| }}{{Languages/Lang|az|{{{1|}}}| }}{{Languages/Lang|bcc|{{{1|}}}| }}{{Languages/Lang|bg|{{{1|}}}| }}{{Languages/Lang|br|{{{1|}}}| }}{{Languages/Lang|bn|{{{1|}}}| }}{{Languages/Lang|bs|{{{1|}}}| }}{{Languages/Lang|ca|{{{1|}}}| }}{{Languages/Lang|cs|{{{1|}}}| }}{{Languages/Lang|da|{{{1|}}}| }}{{Languages/Lang|de|{{{1|}}}| }}{{Languages/Lang|diq|{{{1|}}}| }}{{Languages/Lang|el|{{{1|}}}| }}{{Languages/Lang|eo|{{{1|}}}| }}{{Languages/Lang|es|{{{1|}}}| }}{{Languages/Lang|fa|{{{1|}}}| }}{{Languages/Lang|fi|{{{1|}}}| }}{{Languages/Lang|fr|{{{1|}}}| }}{{Languages/Lang|gl|{{{1|}}}| }}{{Languages/Lang|gu|{{{1|}}}| }}{{Languages/Lang|he|{{{1|}}}| }}{{Languages/Lang|hi|{{{1|}}}| }}{{Languages/Lang|hu|{{{1|}}}| }}{{Languages/Lang|hy|{{{1|}}}| }}{{Languages/Lang|id|{{{1|}}}| }}{{Languages/Lang|io|{{{1|}}}| }}{{Languages/Lang|it|{{{1|}}}| }}{{Languages/Lang|ja|{{{1|}}}| }}{{Languages/Lang|ka|{{{1|}}}| }}{{Languages/Lang|kk|{{{1|}}}| }}{{Languages/Lang|km|{{{1|}}}| }}{{Languages/Lang|ko|{{{1|}}}| }}{{Languages/Lang|ksh|{{{1|}}}| }}{{Languages/Lang|kw|{{{1|}}}| }}{{Languages/Lang|la|{{{1|}}}| }}{{Languages/Lang|min|{{{1|}}}| }}{{Languages/Lang|mk|{{{1|}}}| }}{{Languages/Lang|ml|{{{1|}}}| }}{{Languages/Lang|mr|{{{1|}}}| }}{{Languages/Lang|ms|{{{1|}}}| }}{{Languages/Lang|nl|{{{1|}}}| }}{{Languages/Lang|no|{{{1|}}}| }}{{Languages/Lang|oc|{{{1|}}}| }}{{Languages/Lang|or|{{{1|}}}| }}{{Languages/Lang|pl|{{{1|}}}| }}{{Languages/Lang|pt|{{{1|}}}| }}{{Languages/Lang|pt-br|{{{1|}}}| }}{{Languages/Lang|ro|{{{1|}}}| }}{{Languages/Lang|ru|{{{1|}}}| }}{{Languages/Lang|si|{{{1|}}}| }}{{Languages/Lang|sk|{{{1|}}}| }}{{Languages/Lang|sl|{{{1|}}}| }}{{Languages/Lang|so|{{{1|}}}| }}{{Languages/Lang|sq|{{{1|}}}| }}{{Languages/Lang|sr|{{{1|}}}| }}{{Languages/Lang|sv|{{{1|}}}| }}{{Languages/Lang|ta|{{{1|}}}| }}{{Languages/Lang|th|{{{1|}}}| }}{{Languages/Lang|tr|{{{1|}}}| }}{{Languages/Lang|uk|{{{1|}}}| }}{{Languages/Lang|vi|{{{1|}}}| }}{{Languages/Lang|yi|{{{1|}}}| }}{{Languages/Lang|yue|{{{1|}}}| }}{{Languages/Lang|zh|{{{1|}}}| }}{{Languages/Lang|zh-hans|{{{1|}}}| }}{{Languages/Lang|zh-hant|{{{1|}}}| }}{{Languages/Lang|zh-tw|{{{1|}}}}} ||[[Category:Languages pages without translations]]}}<!-- -->[[Category:Languages pages]]<!-- -->{{#ifeq:{{translation}}|/en||[[Category:Languages pages{{translation}}]]}}</includeonly><noinclude> {{ {{TNTN|documentation}} }} [[Category:Exclude in print]] </noinclude> aa0a3f30852c3d71ab7babadb5e80e3de93f2495 Template:Languages/Lang 10 135 320 319 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{#ifexist: {{#if:{{{2|}}}|{{{2}}}|{{NAMESPACE}}:{{BASEPAGENAME}}}}/{{{1|}}} |&nbsp;• <bdi lang="{{{1|}}}">{{#if:{{{2|}}} |[[:{{{2|}}}/{{{1|}}}|{{#language:{{{1|}}}}}]] |[[:{{NAMESPACE}}:{{BASEPAGENAME}}/{{{1|}}}|{{#language:{{{1|}}}}}]] }}</bdi> }}<noinclude> {{Documentation}} </noinclude> c21fa44889712c6aa27a79bb3191f2f6e29563f4 Template:Languages/Title 10 136 322 321 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{LangSwitch|lang={{{1|}}} |default=Language: |Languages=Languages: |MediaWiki=Languages: |af=Taal: |aln=Gjuha: |am=ቋምቋ፦ |an=Idioma: |ang=Sprǣc: |ar=:اللغة |arc=ܠܫܢܐ: |arn=Dungun: |arz=:اللغة |as=ভাষা: |ast=Llingua: |avk=Ava: |ay=Aru: |az=Dil: |bat-smg=Kalba: |bcc=زبان: |bcl=Tataramon: |be=Мова: |be-tarask=Мова: |bg=Език: |bn=ভাষা: |br=Yezh : |bs=Jezik: |ca=Llengua : |cdo=Ngṳ̄-ngiòng: |ce=Мотт: |ceb=Pinulongan: |ch=Lengguahe: |ckb-arab=زمان: |co=Lingua : |crh-cyrl=Тиль: |crh-latn=Til: |cs=Jazyk: |cu=ѩꙁꙑ́къ : |cv=Чĕлхе: |cy=Iaith: |da=Sprog: |de=Sprache: |diq=Zıwan: |dsb=Rěc: |ee=Gbe: |el=Γλώσσα: |en=Language: |eo=Lingvo: |es=Idioma: |et=Keel: |eu=Hizkuntza: |ext=Palra: |fa=زبان: |fi=Kieli: |fo=Mál: |fr=Langue : |frc=Langue : |frp=Lengoua : |fur=Lenghe : |fy=Taal: |ga=Teanga: |gag=Dil: |gan-hans=语言: |gan-hant=語言: |gl=Lingua: |gn=Ñe'ẽ: |got=Razda: |grc=Γλῶσσα: |gsw=Sproch: |gu=ભાષા: |gv=Çhengey: |hak=Ngî-ngièn: |haw=Kou 'ōlelo: |he=שפה: |hi=भाषा: |hif-latn=Bhasa: |hr=Jezik: |hsb=Rěč: |ht=Lang: |hu=Nyelv: |hy=Լեզու. |ia=Lingua: |id=Bahasa: |ie=Lingue: |ilo=Lengguahe: |io=Linguo: |is=Tungumál: |it=Lingua: |ja=言語: |jv=Basa: |ka=ენა: |kaa=Til: |kab=Tutlayt: |kg=Ndinga: |kiu=Zon: |kk-arab=:ٴتىل |kk-cyrl=Тіл: |kk-latn=Til: |km=ភាសា៖ |kn=ಭಾಷೆ: |ko=언어: |ksh=Sproch: |ku-latn=Ziman: |kv=Кыв: |kw=Yeth: |ky=Тил: |la=Lingua: |lb=Sprooch: |lfn=Lingua: |li=Taol: |lij=Lengoa: |loz=Zwa Siselect: |lt=Kalba: |lv=Valoda: |lzh=語: |mdf=Кяль: |mg=fiteny: |mhr=Йылме: |min=Bahaso: |mk=Јазик: |ml=ഭാഷ: |mn=Хэл: |mr=भाषा: |ms=Bahasa: |mt=Lingwa: |mwl=Lhéngua: |my=ဘာသာ: |myv=Кель: |nah=Tlahtōlli: |nap=Lengua: |nds=Spraak: |nds-nl=Taal: |ne=भाषा: |new=भाषा: |nl=Taal: |nn=Språk: |no=Språk: |nso=Polelo: |oc=Lenga : |os=Æвзаг: |pa=ਭਾਸ਼ਾ: |pam=Amanu: |pdc=Schprooch: |pdt=Sproak: |pl=Język: |pms=Lenga: |pnb=بولی: |pnt=Γλώσσαν: |prg=Bilā: |ps=ژبه: |pt|pt-br=Língua: |qu=Rimay: |rm=Lingua: |ro=Limba: |roa-tara=Lénga: |ru=Язык: |sa=भाषा: |sah=Омугун тыла: |sc=Limba: |scn=Lingua: |sco=Leid: |sdc=Linga: |se=Giella: |sei=Itom: |sh=Jezik: |shi=tutlayt: |si=භාෂාව: |sk=Jazyk: |sl=Jezik: |sli=Sproache: |so=Luqada: |sq=Gjuha: |sr-ec=Језик: |sr-el=Jezik: |srn=Tongo: |ss=Lúlwîmi: |stq=Sproake: |su=Basa: |sv=Språk: |sw=Lugha: |szl=Godka: |ta=மொழி: |te=భాష: |tet=Lian: |tg-cyrl=Забон: |th=ภาษา: |ti=ቋንቋ: |tk=Dil: |tl=Wika: |to=Lea: |tr=Dil: |tt-cyrl=Тел: |tyv=Дыл: |ug-arab=:تىل |ug-latn=Til: |uk=Мова: |vec=Lengua: |vep=Kel’: |vi=Ngôn ngữ: |vo=Pük: |vro=Kiil: |wa=Lingaedje: |war=Yinaknan: |wo=Làkk: |wuu=语言: |xal=Келн: |xh=Ulwimi: |xmf=ნინა: |yi=שפראך: |yo=Èdè: |yue=語言: |zea=Taele: |zh=語言: |zh-hans=语言: |zh-hant=語言: |zu=Ulimi: }}<noinclude>{{Documentation}}</noinclude> 9a6086fadca92393091513e283c466a398fdea1d Template:Nmbox 10 137 324 323 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki <table class="nmbox" style="border:1px solid #AAA; border-collapse:collapse; clear:both; font-size:85%; margin: 0.5em 0"> <tr style="background:#EEF3E2"> {{#if:{{{image|}}}{{{header|}}} | <th class="mbox-image" style="white-space:nowrap; padding:4px 1em; border-{{dir|{{pagelang}}|left|right}}:1px solid #aaa">{{{image|}}} {{{header|}}}</th> | <td class="mbox-empty-cell"></td> <!-- No image. Cell with some width or padding necessary for text cell to have 100% width. --> }} <td class="mbox-text" style="background:#F6F9ED">{{{text|}}}</td> </tr></table><noinclude> {{documentation}} </noinclude> 3e5942f8af86a878f6abd3a6eeec367502baea89 Template:Pagelang 10 138 326 325 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{#titleparts:{{{1|{{PAGENAME}}}}}|1}}||{{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{lc:{{PAGENAME:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}|{{#ifeq:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|{{urlencode:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}|{{#ifeq:{{lc:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}|{{ucfirst:{{lc:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}||{{#switch:{{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}|doc|layout|sandbox|testcases|init|preload=|#default={{#titleparts:{{{1|{{PAGENAME}}}}}||-1}}}}}}}}}}}}<noinclude>{{Documentation}}</noinclude> 58a30c2368e3eec4f48178a05f99574a886ee439 Template:Translation 10 139 328 327 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{#ifeq: {{lc:{{#titleparts:{{FULLPAGENAME}}|1|-1}}}}<!-- broken test; we should restrict to accept only subpages that could match a lowercase language code; keep any uppercase letter meaning not a language code --> | {{lc:{{#language:{{#titleparts:{{FULLPAGENAME}}|1|-1}}}}}}<!-- broken test; fails on some languages whose autonym is identical to their lowercase code --> | | /{{#titleparts:{{FULLPAGENAME}}|1|-1}} }}<noinclude> {{documentation}} [[Category:Translation]] </noinclude> df4871b4aa9beb7ee2f6e276d9819d0a4dfc4541 Template:Uselang 10 140 330 329 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki {{#if: {{{lang|}}} | {{{lang|}}} | {{#ifeq: {{int:Lang}} | <Lang> | default | {{int:Lang}} }} }}<noinclude> {{Documentation}} </noinclude> 297a29f24992bc20bf1a8d217933907f49e263e4 Template:Collapse top/doc 10 141 332 331 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki <noinclude>{{Documentation subpage}} {{timw|{{BASEPAGENAME}}}} </noinclude> <!-- PUT HERE THE DOCUMENTATION --> Use with {{tl|Collapse bottom}}, putting the content to be collapsed between the two templates. This template has many parameters ''that should be documented here''. For now, see the documentation for [[w:Template:Collapse top|the equivalent template on enwiki]]. f6192f75f65394f03685259cce62518779d67256 Template:TNTN 10 81 334 219 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki #REDIRECT [[Template:Translatable template name]] 51aba18c9e7edde0de5272258792895d16b983c2 Template:Translatable template name 10 82 336 220 2016-01-06T06:55:38Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{{#invoke:Template translation{{{sandbox|}}}|getTranslatedTemplate|uselang={{{uselang|}}}|tntns={{{tntns|{{{namespace|}}}}}}|template={{#if:{{{noshift|}}}|{{{template}}}|{{{1}}}}}|noshift={{{noshift|}}}<!-- there are no other parameters here -->}}</includeonly><noinclude>{{documentation}}</noinclude> cf01b803bccfc7ef72e324dc96840b2d093194a4 MediaWiki:Common.css 8 40 337 192 2016-01-06T08:40:57Z Eddie 1 css text/css /* CSS placed here will be applied to all skins */ .smwbuiltin a, .smwbuiltin a.new { color: #FF8000; } /* CSS placed here will be applied to all skins */ /* MediaWiki overrides */ /* body.page-Main_Page h1.firstHeading { display:none; } */ #footer-info { display: none; } /* Hide footer */ li#ca-talk { display: none; } /* Hide discussion tab */ #pt-login { display: none; } /* Hide login text */ #p-tb { display: none; } /* Hide toolbox */ /* #ca-history { display: none; } /* Hide "View history" */ /* Elements */ code { background: none; font: 10pt courier,serif; } h2 { margin-top: 15px; } h3 { color: #222; font-size: 11pt; margin: 10px 0 -5px; } ol img { display: block; margin: 10px 10px 20px; } ol li { } p { margin-top: 10px; } pre { background: #efefef; border: none; font: 10pt courier,serif; margin: 15px 0; padding: 10px; } tt { font-size: 10pt; } /* Controls */ .searchButton { background: #eee; border: 1px solid #ccc; color: #333; font: bold 8pt sans-serif; height: 20px; } /* Boxes */ .fullbox { border: 1px solid #ccc; margin:5px; } .title { background: #e8f2f8; border: none; border-bottom: 1px solid #ccc; color: #0e3793; font: bold 14pt sans-serif; margin: 0; padding: 5px; } .subtitle { font: bold 10pt sans-serif; } .example { background: #efefef; display: block; margin: 15px 0; padding: 10px; } /* Formatting */ .clear { clear: both; } .code { font: 10pt courier,serif; } .hash { color: #090; } .content { padding: 10px; } /* Special elements */ div#kx-linkbar img { margin-right: 20px; } .row {min-width:90% !important;} .toctoggle {display:none} table.wikitable > tr > th, table.wikitable > tr >td, table.wikitable > * > tr >th, table.wikitable > * > tr > td { padding: 1px; } /* div#viki_0{ width:100% !important; }*/ .vikijs-detail-panel { border:none !important; background:white !important; font-size:90%; } .vikijs-graph-container { border:none !important; } .smwtable .row-even { background-color:#FFF; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } .smwtable .row-odd .stripe { background-color:#f0f7f8; text-align:left; padding-left:0; margin-left: 0; padding-right:0; margin-right: 0; list-style-position:inside; } h3#tagline {display:none; } #footer-privacy {display:none} #footer-disclaimer {display:none} #footer-about {display:none} #footer-lastmod {font-size:70%;} #footer-viewcount {font-size:70%;} p.title { color:#009933; font-size:100%; } h2 { font-size:125%; } h5 { color: #666666; } .mw-search-formheader {display:none; } .thumbinner { padding-left:5px; padding-top:5px; padding-bottom:5px; } .thumbcaption { font-size:100%; color:#009933; background: white; text-align: center; } h4 { color:#009933; } form#sfForm.createbox, .formtable, table.formtable tr { background-color:#F0F8FF !important; } form#sfForm.createbox, table.formtable tbody tr td table { border: 1px solid #F0F8FF !important; } option { font-weight:normal; font-size: x-small; } .createboxInput { background-color:#FFFFFF !important; } .navbar-item { color: white !important; font-weight: bold; padding-top: 9px; padding-right: 10px; } .title { color:#009933; text-align: left; font-size:150%; } .top-bar, .top-bar-section ul, .top-bar-section ul li.active > a, .top-bar-section li a:not(.button), .top-bar-section .has-form { background:#061734; font-size:90%; color: #FFFFFF; } .top-bar-section > ul > .divider, .top-bar-section > ul > [role="separator"] { border-color: #164eaf; } /* Darker color for the hover over items */ .top-bar-section ul li.hover > a, .top-bar-section ul li ul.dropdown li.hover > a{ background: #113e8c; } /* Slightly darker color for the dropdowns*/ .top-bar-section ul li ul.dropdown li > a { background: #061734; } .spacer { height: 30px; } .np { height: 15px; } .hierarchyText { font-size:80%; font-weight:bold; height: 20px; } .hierarchyText table tbody tr { background-color: #d5f99b; border: 1px solid #BFE08B; height: 20px; } .examplebread table tbody tr { background-color: #ADDFFF; } .citationtable { border: solid 1px #BBBBBB; } .citationtable td { padding-left: 5px; padding-right: 5px; max-width: 600px; } .citationtablelong td { padding-left: 5px; padding-right: 5px; } .itemtable td { vertical-align: top; min-width: 200px; } .ratingselected a { font-weight: bold; color: orange !important; } .nowrap { white-space: nowrap; } .filtered-filters { float: left; width: 30%; border: 0 !important; padding: 0 !important; margin: 0 !important; background: transparent; } .filtered-filters .filtered-value .filtered-value-option { display: block !important; width: 90% !important; padding: 0 !important; } .filtered-views { border: 0 !important; padding: 0 !important; margin: 0 !important; max-height: 800px; } .filtered-views .filtered-list { width: 95% !important; } .filter_name { width: 150px; background:#96aab2; color:black; text-align:left; align:left; border:1px solid #ddd; padding: 3px; } .filter_value { width: 400px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .filter_icon { width: 50px; text-align:left; border: 1px solid #ddd; padding: 3px; background: white; } .top-bar.expanded .title-area { background:#164eaf; } /* CSS placed here will be applied to all skins */ #ca-protect { display: none !important; } #ca-delete { display: none !important; } .toc, #toc { display: none; } /** * SECTION: SMW-Style Infoboxes * * Many "infoboxes" (not using Template:Infobox) have/had the CSS below * manually entered into each table. This was the case in Template:Award * and Template:Person. Now, instead, those "infoboxes" simply list class= * "smw-style-infobox-table" because this type of "infobox" is similar to * what is used by SemanticMediaWiki and SemanticForms **/ .smw-style-infobox-table { width: 20em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: right; text-align: left; font-size: 92%; } .smw-style-infobox-table tr { vertical-align: top; } .smw-style-infobox-table-header { text-align: center; background-color: #ccccff; font-size: 15px; } /** * END SECTION: SMW-Style Infoboxes **/ .agenda { text-align: left; } .agenda th { border: 1px solid #555555; background-color: #eeeeee; text-align: center; font-size: 120%; } .agenda td { border: 1px solid #555555; padding: 10px; vertical-align: top; } /* Float Left-Right-Center */ .chart-float-right { float:right; margin-left:10px; margin-bottom:10px; clear:both; } .chart-float-left { margin-left:0px; margin-right:10px; float:left; clear:both; } .chart-center { display: inline-block; } /** * SECTION: SMW-Style Infoboxes * * Many "infoboxes" (not using Template:Infobox) have/had the CSS below * manually entered into each table. This was the case in Template:Award * and Template:Person. Now, instead, those "infoboxes" simply list class= * "smw-style-infobox-table" because this type of "infobox" is similar to * what is used by SemanticMediaWiki and SemanticForms **/ .smw-style-infobox-table { width: 20em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: right; text-align: left; font-size: 92%; } .smw-style-infobox-table tr { vertical-align: top; } .smw-style-infobox-table-header { text-align: center; background-color: #ccccff; font-size: 15px; } /** * END SECTION: SMW-Style Infoboxes **/ .agenda { text-align: left; } .agenda th { border: 1px solid #555555; background-color: #eeeeee; text-align: center; font-size: 120%; } .agenda td { border: 1px solid #555555; padding: 10px; vertical-align: top; } /* Float Left-Right-Center */ .chart-float-right { float:right; margin-left:10px; margin-bottom:10px; clear:both; } .chart-float-left { margin-left:0px; margin-right:10px; float:left; clear:both; } .chart-center { display: inline-block; } ed3f2eee26ce059a51e1ffcd736d5a2c9dc8aa14 Template:Extension 10 80 338 218 2016-01-06T09:00:02Z Eddie 1 Replaced content with "<noinclude> This is the "Extension" template. It should be called in the following format: <pre> {{Extension }} </pre> Edit the page to see the template text. </noinclude>..." wikitext text/x-wiki <noinclude> This is the "Extension" template. It should be called in the following format: <pre> {{Extension }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> b44a5371885e61528b3df5a60ab9812867fc081f 339 338 2016-01-06T09:00:22Z Eddie 1 wikitext text/x-wiki <noinclude> This is the "Extension" template. It should be called in the following format: <pre> {{Extension |Name= |Homepage= |Description= |Maintainer= |First released month= |First released year= |Release status= |Development status= |Associated with= |Area of usage= |Shortcut= |Repository= }} </pre> Edit the page to see the template text. [[Category:Info templates]] == Template preview == </noinclude><onlyinclude> {| cellspacing="0" class="smworgtable" style="position: relative; float: right; clear: right; width: 280px;" ! colspan="2" style="padding-top: 2px; " | [[Has name::{{{Name|}}}]] |- | colspan="2" style="padding-top: 2px;" | '''[[Has description::{{{Description|}}}]]''' |- <!-- *** IMAGE SLIDESHOW *** --> {{#if:{{{collection|}}}|{{Tablesection|Label=Image collection|Color=#164eaf|Textcolor=#fff}}}} |- {{#if:{{{collection|}}}|{{Tablesection|Label={{#ask: [[has image collection::{{{collection|}}}]]|?has description|widths=220|heights=220|format=gallery|order=random|widget=slideshow|overlay=yes|class=demo-center|navigation=auto|autocaptions=no}}|Color=#fff|Textcolor=#AAA}}}} |- <!-- *** WORDCLOUD *** --> {{#if:{{{cloud|}}}|{{Tablesection|Label={{{cloud|}}}|Color=#fff|Textcolor=#AAA}}}} |- {{Tablesection|Label=Further Information|Color=#164eaf|Textcolor=#fff}} |- | style="width: 120px;" | Homepage: || [[Has homepage::{{{Homepage|}}}|follow this link]] |- | Maintainer(s): || {{#arraymap:{{{Maintainer|}}}|,|x|{{#set:Has maintainer=x}}{{Nowrap|[[x]]}}}} |- | First released: || [[Was first released month::{{{First released month|}}}]] [[Was first released year::{{{First released year|}}}]] |- | Release status: || [[Has release status::{{{Release status|}}}]] |- | Development status: || [[Has development status::{{{Development status|}}}]] |- | Area of usage: || [[Has area of usage::{{{Area of usage|}}}]] |- | Associated with:{{#info: SMW &#61; [[Semantic MediaWiki]], SB &#61; [[Semantic Bundle]], SMW+ &#61; [[Semantic MediaWiki Plus]], MW &#61; [[MediaWiki]]}} || {{#arraymap:{{{Associated with|}}}|,|x|[[Is associated with::x]]}} |- <!-- *** SHORTCUT *** --> {{#ifeq:{{{Shortcut|}}}|||{{Tablerow|Label=Shortcut:{{#info: This is the shortcut to mark the beginning of the subject line when writing a support request to the mailing list or to the extension's author directly. See also this [[Help:Getting support|help page.]]}}|Value=[[Has shortcut::{{{Shortcut|}}}|{{uc: {{{Shortcut|}}} }}]] }}}} |- <!-- *** URL GIT/SVN *** --> {{#ifeq:{{{Repository|}}}|||{{Tablerow|Label=Repository:|Value={{{repository|{{{Repository|}}}}}} }}}} |- {{Tablesection|Label=Table of Contents|Color=#164eaf|Textcolor=#fff}} |- | colspan="2" style="padding-top: 2px; " |<div id="smworgtable-toc" style="font-size: 90%;">__TOC__</div> |}<includeonly>{{#ifeq: {{{lang|}}} | zh-hans | [[Was first released::{{{First released year|}}}{{{First released month|}}}| ]] | [[Was first released::{{{First released month|}}} {{{First released year|}}}| ]] }}{{#ifeq: {{{Associated with|}}} | MW | [[Category:MW extensions]] | }}{{#ifeq: {{{Associated with|}}} | SMW | [[Category:SMW extensions]] | }} {{#ifeq: {{{Associated with|}}} | SB | [[Category:Semantic Bundle extensions]] | }}{{#ifeq: {{{Associated with|}}} | SMW+ | [[Category:SMW+ extensions]] }}{{#ifeq: {{{Associated with|}}} | MW, SB | [[Category:MW extensions]] [[Category:Semantic Bundle extensions]] | }}{{#ifeq: {{{Associated with|}}} | MW, SMW | [[Category:MW extensions]] [[Category:SMW extensions]] | }}{{#ifeq: {{{Associated with|}}} | SMW, SB | [[Category:SMW extensions]] [[Category:Semantic Bundle extensions]] | }}{{#ifeq: {{{Associated with|}}} | SMW, SMW+ | [[Category:SMW extensions]] [[Category:SMW+ extensions]] | }}{{#ifeq: {{{Associated with|}}} | MW, SMW, SB | [[Category:MW extensions]] [[Category:SMW extensions]] [[Category:Semantic Bundle extensions]] | }}</includeonly></onlyinclude> 26d6dc8a818ae807bf58a56b8eb2dba3217aab63 Template:Tablesection 10 142 340 2016-01-06T09:01:01Z Eddie 1 Created page with "<noinclude>{| ! A ! table section (helper template) |- </noinclude>! colspan="2" style="text-align: center; color: {{{Textcolor|#000}}}; background: {{{Color|#eee}}}"| {{{Lab..." wikitext text/x-wiki <noinclude>{| ! A ! table section (helper template) |- </noinclude>! colspan="2" style="text-align: center; color: {{{Textcolor|#000}}}; background: {{{Color|#eee}}}"| {{{Label}}} <noinclude>|}</noinclude> 609bc87b5206387afec956de12258cc65cb1bb32 Template:Datatype 10 143 341 2016-01-06T09:02:37Z Eddie 1 Created page with "<noinclude> This is the "Datatype" template. It should be called in the following format: <pre> {{Datatype }} </pre> Edit the page to see the template text. </noinclude><inclu..." wikitext text/x-wiki <noinclude> This is the "Datatype" template. It should be called in the following format: <pre> {{Datatype }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 8b1e953b9b36a9ab009491791782d609bbb066d1 342 341 2016-01-06T09:03:18Z Eddie 1 wikitext text/x-wiki <noinclude> This is the '''Datatype''' template, used on [[:Category:Datatypes|'''Datatypes''' documentation pages]]. The template takes the following parameters: * ''datatype name'': The actual name of the datatype. * ''description'': a short text describing the datatype * ''component'': The extension that provides this datatype, i.e. SMW, SM, etc. * ''minimum version'': The minimum version of the extension you need for this datatype. Aka when it was added. It is used like this: <pre>{{Datatype | datatype name=foobar | description=Stores semantic data as foo bar. | component=Semantic MediaWiki | minimum version=1.0 | maximum version=1.8 }}</pre> [[Category:Info templates]] == Template preview == </noinclude><onlyinclude> {| cellspacing="0" class="smworgtable" style="position: relative; float: right; clear: right; width: 280px;" ! colspan="2" style="padding-top: 2px; " | [[Has datatype name::{{{datatype name|}}}]] |- | colspan="2" style="padding-top: 2px; " | '''[[Has description::{{{description|}}}]]''' |- {{Tablesection|Label=Further Information|Color=#164eaf|Textcolor=#fff}} |- | style="width: 120px;" | Provided by: || [[Has component::{{{component|not specified}}}]] |- | Added in version: || [[Has minimum version::{{{minimum version|not specified}}}]] |- | Removed in version: || [[Has maximum version::{{{maximum version|still in use}}}]] |- {{Tablesection|Label=Table of Contents|Color=#164eaf|Textcolor=#fff}} |- | colspan="2" style="padding-top: 2px; " |<div id="smworgtable-toc" style="font-size: 90%;">__TOC__</div> |}<includeonly>[[Category:Datatypes]]</includeonly> </onlyinclude> 1e45be01f2670a2a422745cb7efc51f7e315b5e0 Category:Datatypes 14 144 343 2016-01-06T09:04:59Z Eddie 1 Created page with "This is the datatypes category." wikitext text/x-wiki This is the datatypes category. 092cefcf6e689d5fd9d295ff72466e044e7d6e29 Template:Class links 10 145 344 2016-01-06T09:11:02Z Eddie 1 Created page with "<noinclude> This is the "Class links" template. It should be called in the following format: <pre> {{Class links }} </pre> Edit the page to see the template text. </noinclude>..." wikitext text/x-wiki <noinclude> This is the "Class links" template. It should be called in the following format: <pre> {{Class links }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 0504f5a5eec900ce74d85e88b8b6e77c32741674 345 344 2016-01-06T09:11:24Z Eddie 1 wikitext text/x-wiki [[Form:{{{1}}}|Form]], [[Template:{{{1}}}|Template]] and [[Category:{{{1}}}|Category]]. 4a310551c1da01cb47557c6d466232165dd7c95c Property:Aligns with 102 146 346 2016-01-06T09:15:57Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Property:Adversarial with 102 147 347 2016-01-06T09:16:44Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Template:Tool 10 148 348 2016-01-06T09:23:21Z Eddie 1 Created page with "<noinclude> This is the "Tool" template. It should be called in the following format: <pre> {{Tool }} </pre> Edit the page to see the template text. </noinclude><includeonly>{..." wikitext text/x-wiki <noinclude> This is the "Tool" template. It should be called in the following format: <pre> {{Tool }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 326330c5ce54eafbdfe1f6c59bf37319ac2f47f2 349 348 2016-01-06T09:23:50Z Eddie 1 wikitext text/x-wiki {{Infobox | bodystyle = | bodyclass = | title = {{#if: {{{Ops Nom|}}} | {{{Ops Nom|}}} | Tool Info }} | titlestyle = | titleclass = | headerstyle = | labelstyle = | datastyle = | image1 = {{#if: {{{image1|}}} | {{#if: {{#pos:{{{image1|}}}|.}} | {{#if:{{{image1|}}}|[[File:{{{image1|}}}|300px]]|}} | <img src="{{IO Link | lores | {{{image1}}} }}" style="width:300px;" /> <br />[{{IO Link | hires | {{{image1}}} }} {{{image1}}}] }} | }} | image2 = {{#if: {{{image2|}}} | {{#if: {{#pos:{{{image2|}}}|.}} | {{#if:{{{image2|}}}|[[File:{{{image2|}}}|300px]]|}} | <img src="{{IO Link | lores | {{{image2}}} }}" style="width:300px;" /> <br />[{{IO Link | hires | {{{image2}}} }} {{{image2}}}] }} | }} | header1 = | label1 = [[Ops Nom]] | data1 = {{#if: {{{Ops Nom|}}} | [[Ops Nom::{{{Ops Nom|}}}]] | }} | header2 = | label2 = Alias | data2 = {{#if: {{{Alias|}}} | [[Alias::{{{Alias|}}}]] | }} | header3 = | label3 = Part Number | data3 = {{#if: {{{Part_Number|}}} | [[Part_Number::{{{Part_Number|}}}]] | }} | header4 = | label4 = Links | data4 = {{#if: {{{Part_Number|}}} | [https://mod2.jsc.nasa.gov/ims/1Searchall.asp?keyword1={{{Part_Number}}}&sortby=a&searchIMS=Search IMS]<br /> | }} {{#if: {{{Part_Number|}}} | [http://qfed-sma.jsc.nasa.gov/CDS/CDS/Certification/Search/Results2.aspx?&Type=Part&PartNumber={{{Part_Number}}} Certification]<br /> | }} {{#if: {{{EDCC_Link|}}} | [{{{EDCC_Link}}} Drawing] (NDC Credentials) | }} {{#if: {{{Part_Number|}}} | [https://mycmc-apps.jsc.nasa.gov/CMCImagery/ImageBrowser/imageviewer.html?pn={{{Part_Number}}} CMC Imagery]<br /> | }} | header5 = | label5 = Mass (lbs.) | data5 = {{#if: {{{Mass|}}} | [[Mass::{{{Mass|}}}]] | }} | header6 = | label6 = Length (in.) | data6 = {{#if: {{{Length|}}} | [[Length::{{{Length|}}}]] | }} | header7 = | label7 = Width (in.) | data7 = {{#if: {{{Width|}}} | [[Width::{{{Width|}}}]] | }} | header8 = | label8 = Height (in.) | data8 = {{#if: {{{Height|}}} | [[Height::{{{Height|}}}]] | }} | header9 = | label9 = Parent | data9 = {{#if: {{{Parent|}}} | [[Parent::{{{Parent|}}}]] | }} | header10 = | label10 = Mounted RETs | data10 = {{#if: {{{Mounted RETs|}}} | [[Has Quantity Mounted RETs::{{{Mounted RETs|}}}]] | }} |belowstyle = |below = }}[[Category:Tool]]{{#if: {{{image1|}}} | {{#set: Primary image = {{{image1|}}} }} | }} <noinclude> </noinclude> 245b772be3c4e792eca8c675e45e236fda1a29b8 Template:Infobox 10 149 350 2016-01-06T09:26:38Z Eddie 1 Created page with "{{#ifeq:{{{child|}}}|yes||<table class="infobox {{{bodyclass|}}}" cellspacing="5" style="width:22em; {{{bodystyle|}}}"><!-- Caption -->{{#if:{{{title|}}}|<caption class="{{{t..." wikitext text/x-wiki {{#ifeq:{{{child|}}}|yes||<table class="infobox {{{bodyclass|}}}" cellspacing="5" style="width:22em; {{{bodystyle|}}}"><!-- Caption -->{{#if:{{{title|}}}|<caption class="{{{titleclass|}}}" style="{{{titlestyle|}}}">{{{title}}}</caption>}}<!-- Header -->{{#if:{{{above|}}}|<tr><th colspan=2 class="{{{aboveclass|}}}" style="text-align:center; font-size:125%; font-weight:bold; {{{abovestyle|}}}">{{{above}}}</th></tr>}} }}{{#ifeq:{{{child|}}}|yes|{{#if:{{{title|}}}|'''{{{title}}}'''}}}}<!-- Subheader1 -->{{#if:{{{subheader|{{{subheader1|}}}}}}|{{Infobox/row |data={{{subheader|{{{subheader1|}}}}}} |datastyle={{{subheaderstyle|{{{subheaderstyle1|}}}}}} |class={{{subheaderclass|}}} |rowclass={{{subheaderrowclass|{{{subheaderrowclass1|}}}}}} }} }}<!-- Subheader2 -->{{#if:{{{subheader2|}}}|{{Infobox/row |data={{{subheader2}}} |datastyle={{{subheaderstyle|{{{subheaderstyle2|}}}}}} |class={{{subheaderclass|}}} |rowclass={{{subheaderrowclass2|}}} }} }}<!-- Image1 -->{{#if:{{{image|{{{image1|}}}}}}|{{Infobox/row |data={{{image|{{{image1}}} }}}{{#if:{{{caption|{{{caption1|}}}}}}|<br /><span style="{{{captionstyle|}}}">{{{caption|{{{caption1}}}}}}</span>}} |datastyle={{{imagestyle|}}} |class={{{imageclass|}}} |rowclass={{{imagerowclass1|}}} }} }}<!-- Image2 -->{{#if:{{{image2|}}}|{{Infobox/row |data={{{image2}}}{{#if:{{{caption2|}}}|<br /><span style="{{{captionstyle|}}}">{{{caption2}}}</span>}} |datastyle={{{imagestyle|}}} |class={{{imageclass|}}} |rowclass={{{imagerowclass2|}}} }} }}<!-- -->{{Infobox/row |header={{{header1|}}} |headerstyle={{{headerstyle|}}} |label={{{label1|}}} |labelstyle={{{labelstyle|}}} |data={{{data1|}}} |datastyle={{{datastyle|}}} |class={{{class1|}}} |rowclass={{{rowclass1|}}} }}{{Infobox/row |header={{{header2|}}} |headerstyle={{{headerstyle|}}} |label={{{label2|}}} |labelstyle={{{labelstyle|}}} |data={{{data2|}}} |datastyle={{{datastyle|}}} |class={{{class2|}}} |rowclass={{{rowclass2|}}} }}{{Infobox/row |header={{{header3|}}} |headerstyle={{{headerstyle|}}} |label={{{label3|}}} |labelstyle={{{labelstyle|}}} |data={{{data3|}}} |datastyle={{{datastyle|}}} |class={{{class3|}}} |rowclass={{{rowclass3|}}} }}{{Infobox/row |header={{{header4|}}} |headerstyle={{{headerstyle|}}} |label={{{label4|}}} |labelstyle={{{labelstyle|}}} |data={{{data4|}}} |datastyle={{{datastyle|}}} |class={{{class4|}}} |rowclass={{{rowclass4|}}} }}{{Infobox/row |header={{{header5|}}} |headerstyle={{{headerstyle|}}} |label={{{label5|}}} |labelstyle={{{labelstyle|}}} |data={{{data5|}}} |datastyle={{{datastyle|}}} |class={{{class5|}}} |rowclass={{{rowclass5|}}} }}{{Infobox/row |header={{{header6|}}} |headerstyle={{{headerstyle|}}} |label={{{label6|}}} |labelstyle={{{labelstyle|}}} |data={{{data6|}}} |datastyle={{{datastyle|}}} |class={{{class6|}}} |rowclass={{{rowclass6|}}} }}{{Infobox/row |header={{{header7|}}} |headerstyle={{{headerstyle|}}} |label={{{label7|}}} |labelstyle={{{labelstyle|}}} |data={{{data7|}}} |datastyle={{{datastyle|}}} |class={{{class7|}}} |rowclass={{{rowclass7|}}} }}{{Infobox/row |header={{{header8|}}} |headerstyle={{{headerstyle|}}} |label={{{label8|}}} |labelstyle={{{labelstyle|}}} |data={{{data8|}}} |datastyle={{{datastyle|}}} |class={{{class8|}}} |rowclass={{{rowclass8|}}} }}{{Infobox/row |header={{{header9|}}} |headerstyle={{{headerstyle|}}} |label={{{label9|}}} |labelstyle={{{labelstyle|}}} |data={{{data9|}}} |datastyle={{{datastyle|}}} |class={{{class9|}}} |rowclass={{{rowclass9|}}} }}{{Infobox/row |header={{{header10|}}} |headerstyle={{{headerstyle|}}} |label={{{label10|}}} |labelstyle={{{labelstyle|}}} |data={{{data10|}}} |datastyle={{{datastyle|}}} |class={{{class10|}}} |rowclass={{{rowclass10|}}} }}{{Infobox/row |header={{{header11|}}} |headerstyle={{{headerstyle|}}} |label={{{label11|}}} |labelstyle={{{labelstyle|}}} |data={{{data11|}}} |datastyle={{{datastyle|}}} |class={{{class11|}}} |rowclass={{{rowclass11|}}} }}{{Infobox/row |header={{{header12|}}} |headerstyle={{{headerstyle|}}} |label={{{label12|}}} |labelstyle={{{labelstyle|}}} |data={{{data12|}}} |datastyle={{{datastyle|}}} |class={{{class12|}}} |rowclass={{{rowclass12|}}} }}{{Infobox/row |header={{{header13|}}} |headerstyle={{{headerstyle|}}} |label={{{label13|}}} |labelstyle={{{labelstyle|}}} |data={{{data13|}}} |datastyle={{{datastyle|}}} |class={{{class13|}}} |rowclass={{{rowclass13|}}} }}{{Infobox/row |header={{{header14|}}} |headerstyle={{{headerstyle|}}} |label={{{label14|}}} |labelstyle={{{labelstyle|}}} |data={{{data14|}}} |datastyle={{{datastyle|}}} |class={{{class14|}}} |rowclass={{{rowclass14|}}} }}{{Infobox/row |header={{{header15|}}} |headerstyle={{{headerstyle|}}} |label={{{label15|}}} |labelstyle={{{labelstyle|}}} |data={{{data15|}}} |datastyle={{{datastyle|}}} |class={{{class15|}}} |rowclass={{{rowclass15|}}} }}{{Infobox/row |header={{{header16|}}} |headerstyle={{{headerstyle|}}} |label={{{label16|}}} |labelstyle={{{labelstyle|}}} |data={{{data16|}}} |datastyle={{{datastyle|}}} |class={{{class16|}}} |rowclass={{{rowclass16|}}} }}{{Infobox/row |header={{{header17|}}} |headerstyle={{{headerstyle|}}} |label={{{label17|}}} |labelstyle={{{labelstyle|}}} |data={{{data17|}}} |datastyle={{{datastyle|}}} |class={{{class17|}}} |rowclass={{{rowclass17|}}} }}{{Infobox/row |header={{{header18|}}} |headerstyle={{{headerstyle|}}} |label={{{label18|}}} |labelstyle={{{labelstyle|}}} |data={{{data18|}}} |datastyle={{{datastyle|}}} |class={{{class18|}}} |rowclass={{{rowclass18|}}} }}{{Infobox/row |header={{{header19|}}} |headerstyle={{{headerstyle|}}} |label={{{label19|}}} |labelstyle={{{labelstyle|}}} |data={{{data19|}}} |datastyle={{{datastyle|}}} |class={{{class19|}}} |rowclass={{{rowclass19|}}} }}{{Infobox/row |header={{{header20|}}} |headerstyle={{{headerstyle|}}} |label={{{label20|}}} |labelstyle={{{labelstyle|}}} |data={{{data20|}}} |datastyle={{{datastyle|}}} |class={{{class20|}}} |rowclass={{{rowclass20|}}} }}{{Infobox/row |header={{{header21|}}} |headerstyle={{{headerstyle|}}} |label={{{label21|}}} |labelstyle={{{labelstyle|}}} |data={{{data21|}}} |datastyle={{{datastyle|}}} |class={{{class21|}}} |rowclass={{{rowclass21|}}} }}{{Infobox/row |header={{{header22|}}} |headerstyle={{{headerstyle|}}} |label={{{label22|}}} |labelstyle={{{labelstyle|}}} |data={{{data22|}}} |datastyle={{{datastyle|}}} |class={{{class22|}}} |rowclass={{{rowclass22|}}} }}{{Infobox/row |header={{{header23|}}} |headerstyle={{{headerstyle|}}} |label={{{label23|}}} |labelstyle={{{labelstyle|}}} |data={{{data23|}}} |datastyle={{{datastyle|}}} |class={{{class23|}}} |rowclass={{{rowclass23|}}} }}{{Infobox/row |header={{{header24|}}} |headerstyle={{{headerstyle|}}} |label={{{label24|}}} |labelstyle={{{labelstyle|}}} |data={{{data24|}}} |datastyle={{{datastyle|}}} |class={{{class24|}}} |rowclass={{{rowclass24|}}} }}{{Infobox/row |header={{{header25|}}} |headerstyle={{{headerstyle|}}} |label={{{label25|}}} |labelstyle={{{labelstyle|}}} |data={{{data25|}}} |datastyle={{{datastyle|}}} |class={{{class25|}}} |rowclass={{{rowclass25|}}} }}{{Infobox/row |header={{{header26|}}} |headerstyle={{{headerstyle|}}} |label={{{label26|}}} |labelstyle={{{labelstyle|}}} |data={{{data26|}}} |datastyle={{{datastyle|}}} |class={{{class26|}}} |rowclass={{{rowclass26|}}} }}{{Infobox/row |header={{{header27|}}} |headerstyle={{{headerstyle|}}} |label={{{label27|}}} |labelstyle={{{labelstyle|}}} |data={{{data27|}}} |datastyle={{{datastyle|}}} |class={{{class27|}}} |rowclass={{{rowclass27|}}} }}{{Infobox/row |header={{{header28|}}} |headerstyle={{{headerstyle|}}} |label={{{label28|}}} |labelstyle={{{labelstyle|}}} |data={{{data28|}}} |datastyle={{{datastyle|}}} |class={{{class28|}}} |rowclass={{{rowclass28|}}} }}{{Infobox/row |header={{{header29|}}} |headerstyle={{{headerstyle|}}} |label={{{label29|}}} |labelstyle={{{labelstyle|}}} |data={{{data29|}}} |datastyle={{{datastyle|}}} |class={{{class29|}}} |rowclass={{{rowclass29|}}} }}{{Infobox/row |header={{{header30|}}} |headerstyle={{{headerstyle|}}} |label={{{label30|}}} |labelstyle={{{labelstyle|}}} |data={{{data30|}}} |datastyle={{{datastyle|}}} |class={{{class30|}}} |rowclass={{{rowclass30|}}} }}{{Infobox/row |header={{{header31|}}} |headerstyle={{{headerstyle|}}} |label={{{label31|}}} |labelstyle={{{labelstyle|}}} |data={{{data31|}}} |datastyle={{{datastyle|}}} |class={{{class31|}}} |rowclass={{{rowclass31|}}} }}{{Infobox/row |header={{{header32|}}} |headerstyle={{{headerstyle|}}} |label={{{label32|}}} |labelstyle={{{labelstyle|}}} |data={{{data32|}}} |datastyle={{{datastyle|}}} |class={{{class32|}}} |rowclass={{{rowclass32|}}} }}{{Infobox/row |header={{{header33|}}} |headerstyle={{{headerstyle|}}} |label={{{label33|}}} |labelstyle={{{labelstyle|}}} |data={{{data33|}}} |datastyle={{{datastyle|}}} |class={{{class33|}}} |rowclass={{{rowclass33|}}} }}{{Infobox/row |header={{{header34|}}} |headerstyle={{{headerstyle|}}} |label={{{label34|}}} |labelstyle={{{labelstyle|}}} |data={{{data34|}}} |datastyle={{{datastyle|}}} |class={{{class34|}}} |rowclass={{{rowclass34|}}} }}{{Infobox/row |header={{{header35|}}} |headerstyle={{{headerstyle|}}} |label={{{label35|}}} |labelstyle={{{labelstyle|}}} |data={{{data35|}}} |datastyle={{{datastyle|}}} |class={{{class35|}}} |rowclass={{{rowclass35|}}} }}{{Infobox/row |header={{{header36|}}} |headerstyle={{{headerstyle|}}} |label={{{label36|}}} |labelstyle={{{labelstyle|}}} |data={{{data36|}}} |datastyle={{{datastyle|}}} |class={{{class36|}}} |rowclass={{{rowclass36|}}} }}{{Infobox/row |header={{{header37|}}} |headerstyle={{{headerstyle|}}} |label={{{label37|}}} |labelstyle={{{labelstyle|}}} |data={{{data37|}}} |datastyle={{{datastyle|}}} |class={{{class37|}}} |rowclass={{{rowclass37|}}} }}{{Infobox/row |header={{{header38|}}} |headerstyle={{{headerstyle|}}} |label={{{label38|}}} |labelstyle={{{labelstyle|}}} |data={{{data38|}}} |datastyle={{{datastyle|}}} |class={{{class38|}}} |rowclass={{{rowclass38|}}} }}{{Infobox/row |header={{{header39|}}} |headerstyle={{{headerstyle|}}} |label={{{label39|}}} |labelstyle={{{labelstyle|}}} |data={{{data39|}}} |datastyle={{{datastyle|}}} |class={{{class39|}}} |rowclass={{{rowclass39|}}} }}{{Infobox/row |header={{{header40|}}} |headerstyle={{{headerstyle|}}} |label={{{label40|}}} |labelstyle={{{labelstyle|}}} |data={{{data40|}}} |datastyle={{{datastyle|}}} |class={{{class40|}}} |rowclass={{{rowclass40|}}} }}{{Infobox/row |header={{{header41|}}} |headerstyle={{{headerstyle|}}} |label={{{label41|}}} |labelstyle={{{labelstyle|}}} |data={{{data41|}}} |datastyle={{{datastyle|}}} |class={{{class41|}}} |rowclass={{{rowclass41|}}} }}{{Infobox/row |header={{{header42|}}} |headerstyle={{{headerstyle|}}} |label={{{label42|}}} |labelstyle={{{labelstyle|}}} |data={{{data42|}}} |datastyle={{{datastyle|}}} |class={{{class42|}}} |rowclass={{{rowclass42|}}} }}{{Infobox/row |header={{{header43|}}} |headerstyle={{{headerstyle|}}} |label={{{label43|}}} |labelstyle={{{labelstyle|}}} |data={{{data43|}}} |datastyle={{{datastyle|}}} |class={{{class43|}}} |rowclass={{{rowclass43|}}} }}{{Infobox/row |header={{{header44|}}} |headerstyle={{{headerstyle|}}} |label={{{label44|}}} |labelstyle={{{labelstyle|}}} |data={{{data44|}}} |datastyle={{{datastyle|}}} |class={{{class44|}}} |rowclass={{{rowclass44|}}} }}{{Infobox/row |header={{{header45|}}} |headerstyle={{{headerstyle|}}} |label={{{label45|}}} |labelstyle={{{labelstyle|}}} |data={{{data45|}}} |datastyle={{{datastyle|}}} |class={{{class45|}}} |rowclass={{{rowclass45|}}} }}{{Infobox/row |header={{{header46|}}} |headerstyle={{{headerstyle|}}} |label={{{label46|}}} |labelstyle={{{labelstyle|}}} |data={{{data46|}}} |datastyle={{{datastyle|}}} |class={{{class46|}}} |rowclass={{{rowclass46|}}} }}{{Infobox/row |header={{{header47|}}} |headerstyle={{{headerstyle|}}} |label={{{label47|}}} |labelstyle={{{labelstyle|}}} |data={{{data47|}}} |datastyle={{{datastyle|}}} |class={{{class47|}}} |rowclass={{{rowclass47|}}} }}{{Infobox/row |header={{{header48|}}} |headerstyle={{{headerstyle|}}} |label={{{label48|}}} |labelstyle={{{labelstyle|}}} |data={{{data48|}}} |datastyle={{{datastyle|}}} |class={{{class48|}}} |rowclass={{{rowclass48|}}} }}{{Infobox/row |header={{{header49|}}} |headerstyle={{{headerstyle|}}} |label={{{label49|}}} |labelstyle={{{labelstyle|}}} |data={{{data49|}}} |datastyle={{{datastyle|}}} |class={{{class49|}}} |rowclass={{{rowclass49|}}} }}{{Infobox/row |header={{{header50|}}} |headerstyle={{{headerstyle|}}} |label={{{label50|}}} |labelstyle={{{labelstyle|}}} |data={{{data50|}}} |datastyle={{{datastyle|}}} |class={{{class50|}}} |rowclass={{{rowclass50|}}} }}{{Infobox/row |header={{{header51|}}} |headerstyle={{{headerstyle|}}} |label={{{label51|}}} |labelstyle={{{labelstyle|}}} |data={{{data51|}}} |datastyle={{{datastyle|}}} |class={{{class51|}}} |rowclass={{{rowclass51|}}} }}{{Infobox/row |header={{{header52|}}} |headerstyle={{{headerstyle|}}} |label={{{label52|}}} |labelstyle={{{labelstyle|}}} |data={{{data52|}}} |datastyle={{{datastyle|}}} |class={{{class52|}}} |rowclass={{{rowclass52|}}} }}{{Infobox/row |header={{{header53|}}} |headerstyle={{{headerstyle|}}} |label={{{label53|}}} |labelstyle={{{labelstyle|}}} |data={{{data53|}}} |datastyle={{{datastyle|}}} |class={{{class53|}}} |rowclass={{{rowclass53|}}} }}{{Infobox/row |header={{{header54|}}} |headerstyle={{{headerstyle|}}} |label={{{label54|}}} |labelstyle={{{labelstyle|}}} |data={{{data54|}}} |datastyle={{{datastyle|}}} |class={{{class54|}}} |rowclass={{{rowclass54|}}} }}{{Infobox/row |header={{{header55|}}} |headerstyle={{{headerstyle|}}} |label={{{label55|}}} |labelstyle={{{labelstyle|}}} |data={{{data55|}}} |datastyle={{{datastyle|}}} |class={{{class55|}}} |rowclass={{{rowclass55|}}} }}{{Infobox/row |header={{{header56|}}} |headerstyle={{{headerstyle|}}} |label={{{label56|}}} |labelstyle={{{labelstyle|}}} |data={{{data56|}}} |datastyle={{{datastyle|}}} |class={{{class56|}}} |rowclass={{{rowclass56|}}} }}{{Infobox/row |header={{{header57|}}} |headerstyle={{{headerstyle|}}} |label={{{label57|}}} |labelstyle={{{labelstyle|}}} |data={{{data57|}}} |datastyle={{{datastyle|}}} |class={{{class57|}}} |rowclass={{{rowclass57|}}} }}{{Infobox/row |header={{{header58|}}} |headerstyle={{{headerstyle|}}} |label={{{label58|}}} |labelstyle={{{labelstyle|}}} |data={{{data58|}}} |datastyle={{{datastyle|}}} |class={{{class58|}}} |rowclass={{{rowclass58|}}} }}{{Infobox/row |header={{{header59|}}} |headerstyle={{{headerstyle|}}} |label={{{label59|}}} |labelstyle={{{labelstyle|}}} |data={{{data59|}}} |datastyle={{{datastyle|}}} |class={{{class59|}}} |rowclass={{{rowclass59|}}} }}{{Infobox/row |header={{{header60|}}} |headerstyle={{{headerstyle|}}} |label={{{label60|}}} |labelstyle={{{labelstyle|}}} |data={{{data60|}}} |datastyle={{{datastyle|}}} |class={{{class60|}}} |rowclass={{{rowclass60|}}} }}{{Infobox/row |header={{{header61|}}} |headerstyle={{{headerstyle|}}} |label={{{label61|}}} |labelstyle={{{labelstyle|}}} |data={{{data61|}}} |datastyle={{{datastyle|}}} |class={{{class61|}}} |rowclass={{{rowclass61|}}} }}{{Infobox/row |header={{{header62|}}} |headerstyle={{{headerstyle|}}} |label={{{label62|}}} |labelstyle={{{labelstyle|}}} |data={{{data62|}}} |datastyle={{{datastyle|}}} |class={{{class62|}}} |rowclass={{{rowclass62|}}} }}{{Infobox/row |header={{{header63|}}} |headerstyle={{{headerstyle|}}} |label={{{label63|}}} |labelstyle={{{labelstyle|}}} |data={{{data63|}}} |datastyle={{{datastyle|}}} |class={{{class63|}}} |rowclass={{{rowclass63|}}} }}{{Infobox/row |header={{{header64|}}} |headerstyle={{{headerstyle|}}} |label={{{label64|}}} |labelstyle={{{labelstyle|}}} |data={{{data64|}}} |datastyle={{{datastyle|}}} |class={{{class64|}}} |rowclass={{{rowclass64|}}} }}{{Infobox/row |header={{{header65|}}} |headerstyle={{{headerstyle|}}} |label={{{label65|}}} |labelstyle={{{labelstyle|}}} |data={{{data65|}}} |datastyle={{{datastyle|}}} |class={{{class65|}}} |rowclass={{{rowclass65|}}} }}{{Infobox/row |header={{{header66|}}} |headerstyle={{{headerstyle|}}} |label={{{label66|}}} |labelstyle={{{labelstyle|}}} |data={{{data66|}}} |datastyle={{{datastyle|}}} |class={{{class66|}}} |rowclass={{{rowclass66|}}} }}{{Infobox/row |header={{{header67|}}} |headerstyle={{{headerstyle|}}} |label={{{label67|}}} |labelstyle={{{labelstyle|}}} |data={{{data67|}}} |datastyle={{{datastyle|}}} |class={{{class67|}}} |rowclass={{{rowclass67|}}} }}{{Infobox/row |header={{{header68|}}} |headerstyle={{{headerstyle|}}} |label={{{label68|}}} |labelstyle={{{labelstyle|}}} |data={{{data68|}}} |datastyle={{{datastyle|}}} |class={{{class68|}}} |rowclass={{{rowclass68|}}} }}{{Infobox/row |header={{{header69|}}} |headerstyle={{{headerstyle|}}} |label={{{label69|}}} |labelstyle={{{labelstyle|}}} |data={{{data69|}}} |datastyle={{{datastyle|}}} |class={{{class69|}}} |rowclass={{{rowclass69|}}} }}{{Infobox/row |header={{{header70|}}} |headerstyle={{{headerstyle|}}} |label={{{label70|}}} |labelstyle={{{labelstyle|}}} |data={{{data70|}}} |datastyle={{{datastyle|}}} |class={{{class70|}}} |rowclass={{{rowclass70|}}} }}{{Infobox/row |header={{{header71|}}} |headerstyle={{{headerstyle|}}} |label={{{label71|}}} |labelstyle={{{labelstyle|}}} |data={{{data71|}}} |datastyle={{{datastyle|}}} |class={{{class71|}}} |rowclass={{{rowclass71|}}} }}{{Infobox/row |header={{{header72|}}} |headerstyle={{{headerstyle|}}} |label={{{label72|}}} |labelstyle={{{labelstyle|}}} |data={{{data72|}}} |datastyle={{{datastyle|}}} |class={{{class72|}}} |rowclass={{{rowclass72|}}} }}{{Infobox/row |header={{{header73|}}} |headerstyle={{{headerstyle|}}} |label={{{label73|}}} |labelstyle={{{labelstyle|}}} |data={{{data73|}}} |datastyle={{{datastyle|}}} |class={{{class73|}}} |rowclass={{{rowclass73|}}} }}{{Infobox/row |header={{{header74|}}} |headerstyle={{{headerstyle|}}} |label={{{label74|}}} |labelstyle={{{labelstyle|}}} |data={{{data74|}}} |datastyle={{{datastyle|}}} |class={{{class74|}}} |rowclass={{{rowclass74|}}} }}{{Infobox/row |header={{{header75|}}} |headerstyle={{{headerstyle|}}} |label={{{label75|}}} |labelstyle={{{labelstyle|}}} |data={{{data75|}}} |datastyle={{{datastyle|}}} |class={{{class75|}}} |rowclass={{{rowclass75|}}} }}{{Infobox/row |header={{{header76|}}} |headerstyle={{{headerstyle|}}} |label={{{label76|}}} |labelstyle={{{labelstyle|}}} |data={{{data76|}}} |datastyle={{{datastyle|}}} |class={{{class76|}}} |rowclass={{{rowclass76|}}} }}{{Infobox/row |header={{{header77|}}} |headerstyle={{{headerstyle|}}} |label={{{label77|}}} |labelstyle={{{labelstyle|}}} |data={{{data77|}}} |datastyle={{{datastyle|}}} |class={{{class77|}}} |rowclass={{{rowclass77|}}} }}{{Infobox/row |header={{{header78|}}} |headerstyle={{{headerstyle|}}} |label={{{label78|}}} |labelstyle={{{labelstyle|}}} |data={{{data78|}}} |datastyle={{{datastyle|}}} |class={{{class78|}}} |rowclass={{{rowclass78|}}} }}{{Infobox/row |header={{{header79|}}} |headerstyle={{{headerstyle|}}} |label={{{label79|}}} |labelstyle={{{labelstyle|}}} |data={{{data79|}}} |datastyle={{{datastyle|}}} |class={{{class79|}}} |rowclass={{{rowclass79|}}} }}{{Infobox/row |header={{{header80|}}} |headerstyle={{{headerstyle|}}} |label={{{label80|}}} |labelstyle={{{labelstyle|}}} |data={{{data80|}}} |datastyle={{{datastyle|}}} |class={{{class80|}}} |rowclass={{{rowclass80|}}} }}<!-- Below -->{{#if:{{{below|}}}|<tr><td colspan=2 class="{{{belowclass|}}}" style="text-align:center; {{{belowstyle|}}}">{{{below}}}</td></tr>}}<!-- Navbar -->{{#if:{{{name|}}}|<tr><td colspan=2 style="text-align:right">{{navbar|{{{name}}}|mini=1}}</td></tr>}} {{#ifeq:{{{child|}}}|yes||</table>}}{{#switch:{{lc:{{{italic title|¬}}}}} |¬|no = <!-- no italic title --> ||force|yes = {{italic title|force={{#ifeq:{{lc:{{{italic title|}}}}}|force|true}}}} }}<includeonly>{{#ifeq:{{{decat|}}}|yes||{{#if:{{{data1|}}}{{{data2|}}}{{{data3|}}}{{{data4|}}}{{{data5|}}}{{{data6|}}}{{{data7|}}}{{{data8|}}}{{{data9|}}}{{{data10|}}}{{{data11|}}}{{{data12|}}}{{{data13|}}}{{{data14|}}}{{{data15|}}}{{{data16|}}}{{{data17|}}}{{{data18|}}}{{{data19|}}}{{{data20|}}}{{{data21|}}}{{{data22|}}}{{{data23|}}}{{{data24|}}}{{{data25|}}}{{{data26|}}}{{{data27|}}}{{{data28|}}}{{{data29|}}}{{{data30|}}}{{{data31|}}}{{{data32|}}}{{{data33|}}}{{{data34|}}}{{{data35|}}}{{{data36|}}}{{{data37|}}}{{{data38|}}}{{{data39|}}}{{{data40|}}}{{{data41|}}}{{{data42|}}}{{{data43|}}}{{{data44|}}}{{{data45|}}}{{{data46|}}}{{{data47|}}}{{{data48|}}}{{{data49|}}}{{{data50|}}}{{{data51|}}}{{{data52|}}}{{{data53|}}}{{{data54|}}}{{{data55|}}}{{{data56|}}}{{{data57|}}}{{{data58|}}}{{{data59|}}}{{{data60|}}}{{{data61|}}}{{{data62|}}}{{{data63|}}}{{{data64|}}}{{{data65|}}}{{{data66|}}}{{{data67|}}}{{{data68|}}}{{{data69|}}}{{{data70|}}}{{{data71|}}}{{{data72|}}}{{{data73|}}}{{{data74|}}}{{{data75|}}}{{{data76|}}}{{{data77|}}}{{{data78|}}}{{{data79|}}}{{{data80|}}}||{{namespace detect|main=[[category:articles which use infobox templates with no data rows]]}}}}}}</includeonly><noinclude>{{documentation}}</noinclude> 5713b1e101127a7efaaf2c9bfac459d2ec817ac2 Template:Infobox/row 10 150 351 2016-01-06T09:30:44Z Eddie 1 Created page with "{{#if:{{{header|}}} |<tr><th colspan="2" class="{{{class|}}}" style="text-align:center; {{{headerstyle|}}}">{{{header}}}</th></tr> |{{#if:{{{data|}}} |<tr class="{{{rowcla..." wikitext text/x-wiki {{#if:{{{header|}}} |<tr><th colspan="2" class="{{{class|}}}" style="text-align:center; {{{headerstyle|}}}">{{{header}}}</th></tr> |{{#if:{{{data|}}} |<tr class="{{{rowclass|}}}">{{#if:{{{label|}}} |<th scope="row" style="text-align:left; {{{labelstyle|}}}">{{{label}}}</th> <td class="{{{class|}}}" style="{{{datastyle|}}}"> |<td colspan="2" class="{{{class|}}}" style="text-align:center; {{{datastyle|}}}"> }} {{{data}}}</td></tr> }} }} 49a1f9f5c244da1b34e5bf561520bb7ad7fe0785 Slides 0 151 352 2016-01-06T10:36:31Z Eddie 1 Created page with "{{#github:slides}}" wikitext text/x-wiki {{#github:slides}} be57e93b05967be81c92b03d33b5f3d7811228da 353 352 2016-01-06T10:40:18Z Eddie 1 wikitext text/x-wiki {{#github:https://enterprisemediawiki.github.io/slides/MeetingMinutes}} c1cb9f00711db86e36ff375f9c1288e71b829856 354 353 2016-01-06T10:41:55Z Eddie 1 wikitext text/x-wiki {{#github:enterprisemediawiki.github.io/slides/MeetingMinutes/#/}} b03f0c5ee9965f08ab613ba5ba11475252569def 355 354 2016-01-06T10:43:16Z Eddie 1 wikitext text/x-wiki enterprisemediawiki.github.io/slides/MeetingMinutes/#/ 7be7f34b9d6ca14824a26f4198e93224bcc24a34 356 355 2016-01-06T10:44:07Z Eddie 1 wikitext text/x-wiki {{enterprisemediawiki.github.io/slides/MeetingMinutes}} 993e2138851053b80adf8cbbe6f8e5d0329a0ac5 357 356 2016-01-06T10:44:41Z Eddie 1 wikitext text/x-wiki {{Github:enterprisemediawiki.github.io/slides/MeetingMinutes}} 325cc277ef01e042089ce7b1996a0d7f4bf11d3b 358 357 2016-01-06T10:48:25Z Eddie 1 wikitext text/x-wiki {{Github:enterprisemediawiki.github.io/slides/MeetingMinutes}} [[File:Http://enterprisemediawiki.github.io/slides/MeetingMinutes/|thumbnail]] 1506d57bb9ed52663b715ac27648216e16897b37 Property:Display precision of 102 152 359 2016-01-10T17:16:10Z Eddie 1 Created a property of type [[Has type::Number]] wikitext text/x-wiki This is a property of type [[Has type::Number]]. 9d3dff79653fddb88e6c584827d2b60c3056f646 Property:Has label 102 153 360 2016-01-10T17:19:00Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 361 360 2016-01-10T17:19:39Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::String]]. 28995a61238b5697df1bb46875d44755b356227c Property:Height 102 154 362 2016-01-10T17:20:54Z Eddie 1 Created a property of type [[Has type::Number]] wikitext text/x-wiki This is a property of type [[Has type::Number]]. 9d3dff79653fddb88e6c584827d2b60c3056f646 Property:Namespace 102 155 363 2016-01-10T17:23:22Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Subpage 102 156 364 2016-01-10T17:26:40Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 Property:Glossary-Definition 102 157 365 2016-01-10T17:31:28Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Glossary-Term 102 158 366 2016-01-10T17:32:05Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Category:Page 14 159 367 2016-01-10T19:12:33Z Eddie 1 Created page with "This is the Page category. [[Category:Hidden categories]]" wikitext text/x-wiki This is the Page category. [[Category:Hidden categories]] 4165b31771b13a3c7393d45124a8a4dc7151c678 Property:URL 102 160 368 2016-01-10T19:37:05Z Eddie 1 Created a property of type [[Has type::URL]] wikitext text/x-wiki This is a property of type [[Has type::URL]]. d2baf5c435e78f89e6dfbf0a19dfa3861a4cdf72 Property:Has area 102 161 369 2016-01-10T19:39:26Z Eddie 1 Created a property of type [[Has type::Quantity]] wikitext text/x-wiki This is a property of type [[Has type::Quantity]]. 8090dc44d50899d1e940758dcee82aacc1940ef3 370 369 2016-01-10T19:40:16Z Eddie 1 wikitext text/x-wiki [[Has type::Quantity]] [[Has description::Used for property values that describe quantities, in particular physical quantities such as time or distance.]] [[Category:Lorem ipsum]] * [[Corresponds to::1 km²]] * [[Corresponds to::0.38610 sq mi]] * [[Corresponds to::1000 m²]] * [[Corresponds to::247.1054 acre]] * [[Corresponds to::988.4215 rood]] 3149176f834dceac9afcd882010a6216a2cbcd69 Property:Has description 102 162 371 2016-01-10T19:42:00Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 372 371 2016-01-10T19:42:54Z Eddie 1 wikitext text/x-wiki [[Has type::Text]] [[Has description::Simple descriptive explanatory text property.]] [[Category:Lorem ipsum]. 75b4cf70ed786d248496f5ed497c5100e7261808 Property:Has date 102 163 373 2016-01-10T19:44:03Z Eddie 1 Created a property of type [[Has type::Date]] wikitext text/x-wiki This is a property of type [[Has type::Date]]. 5263c8921631f25051f416df19a72490a588561e Template:LinkToValue 10 164 374 2016-01-10T19:49:24Z Eddie 1 Created page with "<noinclude> This is the "LinkToValue" template. It should be called in the following format: <pre> {{LinkToValue }} </pre> Edit the page to see the template text. </noinclude>..." wikitext text/x-wiki <noinclude> This is the "LinkToValue" template. It should be called in the following format: <pre> {{LinkToValue }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 7468eb2c83076b2d61c92563072f470033afc339 375 374 2016-01-10T19:49:57Z Eddie 1 wikitext text/x-wiki <includeonly>{{{value}}}{{#if: {{{last-element|}}} | | · }}</includeonly> 3b850c37308305c7253a10ec70699f09e7d3275f Template:LinkToAskQueryForParameter 10 165 376 2016-01-10T19:50:52Z Eddie 1 Created page with "<noinclude> This is the "LinkToAskQueryForParameter" template. It should be called in the following format: <pre> {{LinkToAskQueryForParameter }} </pre> Edit the page to see t..." wikitext text/x-wiki <noinclude> This is the "LinkToAskQueryForParameter" template. It should be called in the following format: <pre> {{LinkToAskQueryForParameter }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 389b53f6cfcd0f3a74842044b5a8dfedd5277977 377 376 2016-01-10T19:51:34Z Eddie 1 wikitext text/x-wiki <includeonly>{{#ask: [[{{{property}}}::{{{value}}}]] | limit=0 | searchlabel={{{value}}} }}{{#if: {{{last-element|}}} | | · }}</includeonly> 4733f2750123a93867df89f4afc69670d9ca878b Template:SetValue 10 166 378 2016-01-10T19:52:58Z Eddie 1 Created page with "<noinclude> This is the "SetValue" template. It should be called in the following format: <pre> {{SetValue }} </pre> Edit the page to see the template text. </noinclude><inclu..." wikitext text/x-wiki <noinclude> This is the "SetValue" template. It should be called in the following format: <pre> {{SetValue }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 3a7bba8ab5dff91f6efea8bcd3fbc24e8ad1deb1 379 378 2016-01-10T19:53:23Z Eddie 1 wikitext text/x-wiki <includeonly>{{{value}}}</includeonly> 6364f0d6b585c78ac641f25839ba4e653881678a Template:SetParserValue 10 167 380 2016-01-10T19:54:21Z Eddie 1 Created page with "<noinclude> This is the "SetParserValue" template. It should be called in the following format: <pre> {{SetParserValue }} </pre> Edit the page to see the template text. </noin..." wikitext text/x-wiki <noinclude> This is the "SetParserValue" template. It should be called in the following format: <pre> {{SetParserValue }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 0ca2b87be9120b253093a6c79b7034eb6a4ed3f2 381 380 2016-01-10T19:54:47Z Eddie 1 wikitext text/x-wiki <includeonly>{{{value}}}{{#if: {{{last-element|}}} | | : }}</includeonly> 286095058907ec34a62676e2685ad16f8504021c Template:SetParserForValueInclusion 10 168 382 2016-01-10T19:55:22Z Eddie 1 Created page with "<noinclude> This is the "SetParserForValueInclusion" template. It should be called in the following format: <pre> {{SetParserForValueInclusion }} </pre> Edit the page to see t..." wikitext text/x-wiki <noinclude> This is the "SetParserForValueInclusion" template. It should be called in the following format: <pre> {{SetParserForValueInclusion }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 977ac67fb9919a9d435eb4f41d9df50ea6733745 383 382 2016-01-10T19:56:02Z Eddie 1 wikitext text/x-wiki <includeonly>{{{value}}}{{#if: {{{last-element|}}} | |,}} </includeonly> 4f4b44e96a7ad0b0e56c8b776478de4a117c2f98 Template:Multi 10 169 384 2016-01-10T19:57:58Z Eddie 1 Created page with "<noinclude> This is the "Multi" template. It should be called in the following format: <pre> {{Multi }} </pre> Edit the page to see the template text. </noinclude><includeonly..." wikitext text/x-wiki <noinclude> This is the "Multi" template. It should be called in the following format: <pre> {{Multi }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 3faeb9984ab89b1428f229f089f5ca29be73cf98 385 384 2016-01-10T19:58:21Z Eddie 1 wikitext text/x-wiki *{{{label|}}} - {{{result|}}} <br> fb4528f6b9a23e02d03b1db23654bc712b9ee24f Template:HoldsMulti 10 170 386 2016-01-10T19:59:38Z Eddie 1 Created page with "<noinclude> This is the "HoldsMulti" template. It should be called in the following format: <pre> {{HoldsMulti }} </pre> Edit the page to see the template text. </noinclude><i..." wikitext text/x-wiki <noinclude> This is the "HoldsMulti" template. It should be called in the following format: <pre> {{HoldsMulti }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 4854ced93b343b97aab7589b5755ef803c2c1a8e 387 386 2016-01-10T20:00:01Z Eddie 1 Replaced content with "{{{Multi|}}}" wikitext text/x-wiki {{{Multi|}}} 83130d09ddb222f0be29a51e300cc71495e7cda4 Template:Show items 10 171 388 2016-01-10T20:01:36Z Eddie 1 Created page with "<noinclude> This is the "Show items" template. It should be called in the following format: <pre> {{Show items }} </pre> Edit the page to see the template text. </noinclude><i..." wikitext text/x-wiki <noinclude> This is the "Show items" template. It should be called in the following format: <pre> {{Show items }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 95e1fc7c3d269d097beac83b464d00605a1ed6c4 389 388 2016-01-10T20:02:05Z Eddie 1 wikitext text/x-wiki <noinclude> This is the "Show items" template. It should be called in the following format: <pre> {{Show items |Property 1= |Property 2= }} </pre> Edit the page to see the template text. </noinclude><includeonly> '''Property 1:''' {{{Property 1|}}} '''Property 2:''' {{{Property 2|}}} </includeonly> afef2f35fbaf46d85fd801e8c28cb01dd40a1b49 Template:Listpages 10 172 390 2016-01-10T20:03:44Z Eddie 1 Created page with "<noinclude> This is the "Listpages" template. It should be called in the following format: <pre> {{Listpages }} </pre> Edit the page to see the template text. </noinclude><inc..." wikitext text/x-wiki <noinclude> This is the "Listpages" template. It should be called in the following format: <pre> {{Listpages }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 97ec00beca83c8d528dabe46431582f56e48d071 391 390 2016-01-10T20:04:21Z Eddie 1 wikitext text/x-wiki <includeonly> == Only the values == * {{{1|}}} * <big>'''{{{2|}}}'''</big> == Increase decrease values == {{#autoedit:form=Test |target=Valuetest |link text=Increase |link type=button |query string=Test[value]={{#expr:{{#show:Valuetest|?Value}} + 1}} |reload }} <--------> {{#autoedit:form=Test |target=Valuetest |link text=Decrease |link type=button |query string=Test[value]={{#expr:{{#show:Valuetest|?Value}} - 1}} |reload }} == Input box == <inputbox> type=create break=no </inputbox></includeonly> 6269cb8e3907b8e011d9704c349d9e762b94a87b Blackbook 0 173 392 2016-01-13T16:41:33Z Eddie 1 Created page with "<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="..." wikitext text/x-wiki <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us" dir=""> <head> <script type="text/javascript">var _starttime = new Date().getTime();</script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="robots" content="index,follow" /> <link rel="shortcut icon" href="favicon.ico" /> <meta name="generator" content=" Wik.is" /> <link rel="search" type="application/opensearchdescription+xml" title="Federal Data Web 2.0 Wiki Pilot Search" href="/@gui/opensearch/description" /> <title>Blackbook 2 and 3 - Federal Data Web 2.0 Wiki Pilot</title> <!-- default css --> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/_reset.css"/> <link rel="stylesheet" type="text/css" media="screen" href="skins/common/css.php" /> <!--[if IE 7]><style type="text/css">@import "/skins/common/_ie7.css";</style><![endif]--><!--[if IE 6]><style type="text/css">@import "/skins/common/_ie.css";</style><![endif]--> <link rel="stylesheet" type="text/css" media="print" href="skins/common/print.css" /> <!-- default scripting --> <script type="text/javascript" src="skins/common/js.php?perms=LOGIN,BROWSE,READ,SUBSCRIBE&amp;lang=en-us"></script> <!-- specific screen stylesheets--> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/sky-tangerine/css.php"/> <!-- specific print stylesheets --> <link rel="stylesheet" type="text/css" media="print" href="skins/fiesta/print.css" /> <!-- IE6 & IE7 specific stuff --> <!--[if IE]><meta http-equiv="imagetoolbar" content="no" /><![endif]--> <!--[if IE 6]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie6.php"/><![endif]--> <!--[if IE 7]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie7.php"/><![endif]--> <script type="text/javascript"> _page_redirect = false; _path_tpl = '/skins/fiesta'; _path_skin = '/skins/fiesta/sky-tangerine'; _path_common = '/skins/common'; _path_icons = '/skins/common/icons'; editToken = 'f50e1eed8f38fedcfc02890ed226112a'; _userName = 'Anonymous'; _userId = '2'; var _editor_styles_path = ['/skins/fiesta/_editor.css', '/skins/fiesta/sky-tangerine/_content.css', '']; _today = '2 Oct 2010'; baseHref = '/web/20101003032546/http://federaldata.Wik.is'; _page_titlePath = '/'; _page_titleName = 'Blackbook 2 and 3'; _page_ID = 710; _total_images = 6; contextTopic = 'Blackbook 2 and 3'; _over_storage_quota = false; saveFlag = false; // remote scripting library // (c) copyright 2005 modernmethod, inc var sajax_debug_mode = false; var sajax_request_type = "POST"; function sajax_debug(text) { if (sajax_debug_mode) alert("RSD: " + text); }; function sajax_init_object() { sajax_debug("sajax_init_object() called.."); var A = window.XMLHttpRequest ? new XMLHttpRequest() : window.ActiveXObject ? new ActiveXObject("Microsoft.XMLHTTP") : null; if (!A) sajax_debug("Could not create connection object."); return A; }; function _sajax_do_call(x, func_name, args) { var i, x, n; var uri; var post_data; uri = "/index.php"; if (sajax_request_type == "GET") { if (uri.indexOf("?") == -1) uri = uri + "?rs=" + encodeURIComponent(func_name); else uri = uri + "&rs=" + encodeURIComponent(func_name); for (i = 0; i < args.length-1; i++) { var a = args[i]; uri = uri + "&rsargs[]=" + encodeURIComponent(a); } uri = uri + "&rsrnd=" + new Date().getTime(); post_data = null; } else { post_data = "rs=" + func_name; for (i = 0; i < args.length-1; i++) { var a = args[i]; post_data = post_data + "&rsargs[]=" + encodeURIComponent(a); } } x.open(sajax_request_type, uri, true); if (sajax_request_type == "POST") { x.setRequestHeader("Method", "POST " + uri + " HTTP/1.1"); x.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); } x.onreadystatechange = function() { if (x.readyState != 4) return; if (typeof sajax_debug != 'undefined') sajax_debug("received " + x.responseText); var status; var data = x.responseText.replace(/^\s+/, ''); status = data.charAt(0); data = data.substring(2); if (status == "-") alert("Error: " + data); else args[args.length-1](data); } x.send(post_data); sajax_debug(func_name + " uri = " + uri + "/post = " + post_data); sajax_debug(func_name + " waiting.."); return x; }; function sajax_do_call(func_name, args) { x = sajax_init_object(); _sajax_do_call(x, func_name, args); delete x; }; function x_breadcrumbSet() { sajax_do_call("breadcrumbSet", x_breadcrumbSet.arguments); }; function x_wfAdminUserForm() { sajax_do_call("wfAdminUserForm", x_wfAdminUserForm.arguments); }; function x_wfSetUserOption() { sajax_do_call("wfSetUserOption", x_wfSetUserOption.arguments); }; function x_wfSetRestrictions() { sajax_do_call("wfSetRestrictions", x_wfSetRestrictions.arguments); }; function x_setUserOption() { sajax_do_call("setUserOption", x_setUserOption.arguments); }; function x_wfValidateUserOrGroup() { sajax_do_call("wfValidateUserOrGroup", x_wfValidateUserOrGroup.arguments); }; function x_wfSaveEdit() { sajax_do_call("wfSaveEdit", x_wfSaveEdit.arguments); }; function x_wfQueryLinks() { sajax_do_call("wfQueryLinks", x_wfQueryLinks.arguments); }; function x_loadInplaceEditor() { sajax_do_call("loadInplaceEditor", x_loadInplaceEditor.arguments); }; function x_doSetbaseHref() { sajax_do_call("doSetbaseHref", x_doSetbaseHref.arguments); }; function x_showFileAttachments() { sajax_do_call("showFileAttachments", x_showFileAttachments.arguments); }; function x_doSectionEdit() { sajax_do_call("doSectionEdit", x_doSectionEdit.arguments); }; function x_postComment() { sajax_do_call("postComment", x_postComment.arguments); }; function x_getComments() { sajax_do_call("getComments", x_getComments.arguments); }; function x_deleteComment() { sajax_do_call("deleteComment", x_deleteComment.arguments); }; function x_editComment() { sajax_do_call("editComment", x_editComment.arguments); }; function x_wfEmailPage() { sajax_do_call("wfEmailPage", x_wfEmailPage.arguments); }; function x_wfCheckNewTitle() { sajax_do_call("wfCheckNewTitle", x_wfCheckNewTitle.arguments); }; function x_wfDeleteFile() { sajax_do_call("wfDeleteFile", x_wfDeleteFile.arguments); }; function x_wfSetPageProperties() { sajax_do_call("wfSetPageProperties", x_wfSetPageProperties.arguments); }; function x_wfDeleteTopic() { sajax_do_call("wfDeleteTopic", x_wfDeleteTopic.arguments); }; function x_wfRenameTopic() { sajax_do_call("wfRenameTopic", x_wfRenameTopic.arguments); }; function x_wfMoveAttachments() { sajax_do_call("wfMoveAttachments", x_wfMoveAttachments.arguments); }; function x_wfGetAttachmentUrl() { sajax_do_call("wfGetAttachmentUrl", x_wfGetAttachmentUrl.arguments); }; function x_wfInlineImageGallery() { sajax_do_call("wfInlineImageGallery", x_wfInlineImageGallery.arguments); }; function x_wfSetFileDescription() { sajax_do_call("wfSetFileDescription", x_wfSetFileDescription.arguments); }; function x_wfChangeLoginView() { sajax_do_call("wfChangeLoginView", x_wfChangeLoginView.arguments); }; function x_wfChangeLoginViewToCreate() { sajax_do_call("wfChangeLoginViewToCreate", x_wfChangeLoginViewToCreate.arguments); }; function x_wfSaveCredsToSession() { sajax_do_call("wfSaveCredsToSession", x_wfSaveCredsToSession.arguments); }; function x_wfChangeAddServiceView() { sajax_do_call("wfChangeAddServiceView", x_wfChangeAddServiceView.arguments); }; function x_wfSaveLoginPageCreds() { sajax_do_call("wfSaveLoginPageCreds", x_wfSaveLoginPageCreds.arguments); }; function x_wfRemindPassword() { sajax_do_call("wfRemindPassword", x_wfRemindPassword.arguments); }; function x_wfChangeAvailUsersPage() { sajax_do_call("wfChangeAvailUsersPage", x_wfChangeAvailUsersPage.arguments); }; window.onbeforeunload = checkForChanges; function checkForChanges() { if (saveFlag && !doCheckChanges(cur_editor)) { return "You have made changes to the content without saving your changes. Are you sure you want to exit this page?"; } } var aLt = new Array();aLt["attach-no-description"] = 'No description'; aLt["cancel"] = 'Cancel'; aLt["comment-delete"] = 'Are you sure you want to delete this comment?'; aLt["gallery-close"] = 'close'; aLt["gallery-next"] = 'next'; aLt["gallery-prev"] = 'prev'; aLt["internal-error"] = 'Sorry, but there was an internal problem - please try again soon.'; aLt["js-label_cancel"] = 'Cancel'; aLt["js-label_save"] = 'Save'; aLt["js-tooltip_cancel"] = 'Exit Without Saving Changes'; aLt["js-tooltip_save"] = 'Save and Exit (Alt+S)'; aLt["ldap-provide-credentials"] = 'Please provide external service login credentials.'; aLt["loading"] = 'Loading...'; aLt["menu-confirm-delete"] = 'Are you sure you want to delete this file?'; aLt["menu-delete-file"] = 'Delete'; aLt["menu-edit-description"] = 'Edit description'; aLt["menu-move-file"] = 'Move'; aLt["menu-previous-versions"] = 'Previous versions'; aLt["menu-view-original"] = 'View original'; aLt["print-end-notes"] = 'Endnotes'; aLt["ready"] = 'Ready'; aLt["submit"] = 'Submit'; aLt["select-files"] = 'Select files...'; aLt["wikibits-attach-another"] = 'Attach another file'; aLt["wikibits-attach-file"] = 'Attach File'; aLt["wikibits-cant-attach-editing"] = 'Sorry, you can\'t attach files while editing a page. Please close the editor first.'; aLt["wikibits-edit-section"] = 'Edit section'; aLt["wikibits-remove-file"] = 'Remove file'; var wfMsg = function (key) { return aLt[key] ? aLt[key] : 'MISSING: ' + key; };var navMaxWidth = 1600; //hook in menu clicking events to the document's body YAHOO.util.Event.addListener(document, "click", function () { FileMenu.bodyClick(); DWMenu.BodyClick(); }); YAHOO.util.Event.onDOMReady(function () { new clientWindow }); YAHOO.util.Event.onAvailable("siteNavTree", wik.nav.init, wik.nav, true); YAHOO.util.Event.onDOMReady(function() { tb_init('a.lightbox, area.lightbox, input.lightbox, a[@rel=awesomebox]');//pass where to apply thickbox imgLoader = new Image();// preload image imgLoader.src = tb_pathToImage; }); YAHOO.util.Event.onDOMReady(function() { MTComments.HookBehavior(); }); </script> <!-- styles overwritten via control panel - load this css last --> </head> <body class=" en-us"> <noscript>This application requires Javascript to be enabled.</noscript> <div class="global"> <div class="globalWrap"> <div class="header"> <div class="mastPre"></div> <div class="mast"> <div class="siteLogo"> <a href="" title="Federal Data Web 2.0 Wiki Pilot"><img src="skins/fiesta/sky-tangerine/logo.png" alt="Federal Data Web 2.0 Wiki Pilot" title="Federal Data Web 2.0 Wiki Pilot"/></a> </div> </div> <div class="mastPost"></div> <div class="siteNavPre"></div> <div class="siteNav"> <div class="userAuthPre"></div> <div class="userAuth"> <span>Logged in:</span> <span>Logged in as:</span> <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3" class="userLogin">Log in</a> </div> <div class="userAuthPost"></div> <div class="custom custom2"> </div> <div class="navPre"></div> <div id="siteNavTree"><div class="node dockedNode homeNode lastDocked parentClosed" id="n21" c="n2348,n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n46,n842,n498,n418,n75,n73,n654,n1883,n534,n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757" path=""><a href="" title="Federal Data Web 2.0 Wiki Pilot"><span>Federal Data Web 2....</span></a></div><div class="node childNode sibling" id="n2348" p="n21" path="Analytics/"><a href="Analytics" title="Analytics"><span>Analytics</span></a></div><div class="node childNode sibling selected" id="n710" p="n21" path="Blackbook_2_and_3/"><a href="Blackbook_2_and_3" title="Blackbook 2 and 3"><span>Blackbook 2 and 3</span></a></div><div class="node childNode sibling" id="n70" p="n21" path="Blog_(Web_Log)/"><a href="Blog_(Web_Log)" title="Blog (Web Log)"><span>Blog (Web Log)</span></a></div><div class="node childNode sibling" id="n542" p="n21" path="Cambridge_Semantics_Recovery.gov/"><a href="Cambridge_Semantics_Recovery.gov" title="Cambridge Semantics Recovery.gov"><span>Cambridge Semantic...</span></a></div><div class="node childNode sibling" id="n497" p="n21" path="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive/"><a href="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive" title="Comments and Innovations for the Open Government and Transparency Directive"><span>Comments and Innov...</span></a></div><div class="node childNode sibling" id="n1144" p="n21" path="Data.gov/"><a href="Data.gov" title="Data.gov Adds Geoviewer"><span>Data.gov Adds Geovi...</span></a></div><div class="node childNode sibling" id="n702" p="n21" path="Data.gov_Concept_of_Operations_v0.7/"><a href="Data.gov_Concept_of_Operations_v0.7" title="Data.gov Concept of Operations"><span>Data.gov Concept of...</span></a></div><div class="node childNode sibling" id="n2349" p="n21" path="Data.gov_CONOPS/"><a href="Data.gov_CONOPS" title="Data.gov CONOPS"><span>Data.gov CONOPS</span></a></div><div class="node childNode sibling" id="n1437" p="n21" path="Data.gov%2fsemantic/"><a href="Data.gov%2f%2fsemantic" title="Data.gov/semantic"><span>Data.gov/semantic</span></a></div><div class="node childNode sibling parentClosed" id="n2346" p="n21" path="Data_Science/" cd="0"><a href="Data_Science" title="Data Science"><span>Data Science</span></a></div><div class="node childNode sibling" id="n990" p="n21" path="Executive_Office_of_the_President_-_OMB_and_NSA_Detail/"><a href="Executive_Office_of_the_President_-_OMB_and_NSA_Detail" title="Executive Office of the President - OMB and NSA Detail for Data.gov"><span>Executive Office of ...</span></a></div><div class="node childNode sibling parentClosed" id="n35" p="n21" path="Federal_Data_Architecture_Subcommittee_(DAS)/" cd="0"><a href="Federal_Data_Architecture_Subcommittee_(DAS)" title="Federal Data Architecture Subcommittee (DAS)"><span>Federal Data Archite...</span></a></div><div class="node childNode sibling" id="n33" p="n21" path="Federal_Data_Reference_Model/"><a href="Federal_Data_Reference_Model" title="Federal Data Reference Model"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n34" p="n21" path="Federal_Data_Reference_Model_2.0/" cd="0"><a href="Federal_Data_Reference_Model_2.0" title="Federal Data Reference Model 2.0"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n526" p="n21" path="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form/" cd="0"><a href="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form" title="Federal Enterprise Architecture Reference Model Revision Submission Form (DRM 3.0)"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling parentClosed" id="n543" p="n21" path="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0/" cd="0"><a href="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0" title="Federal Enterprise Architecture Security and Privacy Profile Version 3.0"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling" id="n1884" p="n21" path="Federal_IT_Dashboard/"><a href="Federal_IT_Dashboard" title="Federal IT Dashboard"><span>Federal IT Dashboar...</span></a></div><div class="node childNode sibling parentClosed" id="n46" p="n21" path="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)/" cd="0"><a href="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)" title="Federal Semantic Interoperability Community of Practice (SICoP)"><span>Federal Semantic Int...</span></a></div><div class="node childNode sibling" id="n842" p="n21" path="FGDC_Standards_WG_meeting_-_February_23,_2010/"><a href="FGDC_Standards_WG_meeting_-_February_23%2c_2010" title="FGDC Standards WG Meeting - February 23, 2010"><span>FGDC Standards WG ...</span></a></div><div class="node childNode sibling" id="n498" p="n21" path="George_Thomas_on_Recovery.gov/"><a href="George_Thomas_on_Recovery.gov" title="George Thomas on Recovery.gov"><span>George Thomas on R...</span></a></div><div class="node childNode sibling parentClosed" id="n418" p="n21" path="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society/" cd="0"><a href="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society" title="Harnessing the Power of Digital Data for Science and Society"><span>Harnessing the Powe...</span></a></div><div class="node childNode sibling" id="n75" p="n21" path="Interagency_Forum_on_Data_Preservation,_Stewardship,_and_LifeCycle_ESIP_Federation_Meeting,_January_8,_2009/"><a href="Interagency_Forum_on_Data_Preservation%2c_Stewardship%2c_and_LifeCycle_ESIP_Federation_Meeting%2c_January_8%2c_2009" title="Interagency Forum on Data Preservation, Stewardship, and LifeCycle ESIP Federation Meeting, January 8, 2009"><span>Interagency Forum o...</span></a></div><div class="node childNode sibling parentClosed" id="n73" p="n21" path="Interagency_Working_Group_on_Digitial_Data/" cd="0"><a href="Interagency_Working_Group_on_Digitial_Data" title="Interagency Working Group on Digitial Data"><span>Interagency Working...</span></a></div><div class="node childNode sibling" id="n654" p="n21" path="June_4,_2009_How_Does_Government_Become_an_Open_Platform?/"><a href="June_4%2c_2009_How_Does_Government_Become_an_Open_Platform%3f" title="June 4, 2009 How Does Government Become an Open Platform?"><span>June 4, 2009 How Do...</span></a></div><div class="node childNode sibling" id="n1883" p="n21" path="Labor's_Enforcement_Data_Catalog/"><a href="Labor's_Enforcement_Data_Catalog" title="Labor's Enforcement Data Catalog"><span>Labor's Enforcement...</span></a></div><div class="node childNode sibling moreNodes" id="n534" p="n21" path="May_13,_2009_Semantic_Web_Meetup/" content="May 13, 2009 Seman..." contentTitle="May 13, 2009 Semantic Web Meetup" hiddenNodes="n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757"><a href="May_13%2c_2009_Semantic_Web_Meetup" title="More..."><span class="more">...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2368" p="n21" path="Model_for_Performance-Driven_Government/" cd="0"><a href="Model_for_Performance-Driven_Government" title="Model for Performance-Driven Government"><span>Model for Performan...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n704" p="n21" path="NIEM/"><a href="NIEM" title="NIEM"><span>NIEM</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n661" p="n21" path="Open_Group_Enterprise_Vocabularly_Workshop_June_3,_2009/"><a href="Open_Group_Enterprise_Vocabularly_Workshop_June_3%2c_2009" title="Open Group Enterprise Vocabularly Workshop June 3, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n653" p="n21" path="Open_Group_Enterprise_Vocabulary_Workshop_May_20,_2009/"><a href="Open_Group_Enterprise_Vocabulary_Workshop_May_20%2c_2009" title="Open Group Enterprise Vocabulary Workshop May 20, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n711" p="n21" path="Page_Title/"><a href="Page_Title" title="Open Government Directive Workshop, January 11, 2010"><span>Open Government Di...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1473" p="n21" path="Scientific_Data_Management_for_Government_Agencies/"><a href="Scientific_Data_Management_for_Government_Agencies" title="Scientific Data Management for Government Agencies"><span>Scientific Data Mana...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2352" p="n21" path="Semantic_eScience/" cd="0"><a href="Semantic_eScience" title="Semantic eScience"><span>Semantic eScience</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n427" p="n21" path="Statistical_Abstract_of_the_United_States:_2009/" cd="0"><a href="Statistical_Abstract_of_the_United_States%3a_2009" title="Statistical Abstract of the United States: 2009"><span>Statistical Abstract ...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1140" p="n21" path="Statistics/" cd="0"><a href="Statistics" title="Statistics"><span>Statistics</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2287" p="n21" path="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010/" cd="0"><a href="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010" title="Survey of EPA and Other Federal Agency Scientific Data Management Policies and Guidance 2010"><span>Survey of EPA and O...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n581" p="n21" path="The_Recovery_Dialogue_on_IT_Solutions/" cd="0"><a href="The_Recovery_Dialogue_on_IT_Solutions" title="The Recovery Dialogue on IT Solutions"><span>The Recovery Dialog...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n695" p="n21" path="Tools_for_linked_data_from_DERI/"><a href="Tools_for_linked_data_from_DERI" title="Tools for linked data from DERI"><span>Tools for linked dat...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1935" p="n21" path="Top_Secret_America/"><a href="Top_Secret_America" title="Top Secret America"><span>Top Secret America</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1134" p="n21" path="Ucore-SL/" cd="0"><a href="Ucore-SL" title="Ucore-SL"><span>Ucore-SL</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n500" p="n21" path="W3C_eGovernment_Interest_Group/" cd="0"><a href="W3C_eGovernment_Interest_Group" title="W3C eGovernment Interest Group"><span>W3C eGovernment In...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n2359" p="n21" path="Watershed_Boundary_Dataset/"><a href="Watershed_Boundary_Dataset" title="Watershed Boundary Dataset"><span>Watershed Boundary ...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1757" p="n21" path="White_House_Salaries/"><a href="White_House_Salaries" title="White House Salaries"><span>White House Salarie...</span></a></div></div> <div class="navPost"></div> <div class="custom"> </div> </div> <div class="siteNavPost"></div> </div> <div class="body"> <div class="bodyHeader"> <div class="pre"></div> <div class="post"></div> </div> <div class="page"> <!-- required print options --> <div class="custom custom1"> </div> <div class="siteNav"> <div class="pre"></div> <div class="siteSearch"> <fieldset class="search"> <form action="Special:Search"> <span>Search: </span><input id="searchInput" class="inputText" name="search" type="text" value="" /> <input type="hidden" name="type" value="fulltext" /> <input type="submit" name="go" class="inputSubmit" value="Find" /> </form> </fieldset> </div> <ul> <li class="userPage"><a href="User:Anonymous"><span></span>My Page</a></li> <li class="siteChanges"><a href="Special:Recentchanges"><span></span>Recent changes</a></li> <li class="siteTools"><a href="#" onclick="return DWMenu.Position('menuTools', this, 0, 0);"><span></span>Tools</a></li> <li class="siteHelp"><a href="Resources/Documentation/FAQ/MindTouch_Express"><span></span>Help</a></li> <li class="siteHelp"><a href="pro/"><span></span>Go Pro</a></li> </ul> <div class="post"></div> </div> <div class="pageBar"> <div class="pre"></div> <div class="pageRevision"> <!-- last modified --> Page last modified <a href="index.php?title=Blackbook_2_and_3&amp;action=history" title="20:27, 15 Feb 2010">20:27, 15 Feb 2010</a> by <a href="User:LucasGraim" class="link-user" rel="internal">LucasGraim</a> <!-- end last modified --> </div> <div class="pageNav"> <ul> <li class="pageEdit"><a href="#" title="Edit page" onclick="return false" class="disabled"><span></span>Edit page</a></li> <li class="pageAdd"><a href="#" title="New page" class="disabled"><span></span>New page</a></li> <li class="pageRestrict"><a href="#" title="Restrict access" onclick="return false" class="disabled"><span></span>Restrict access</a></li> <li class="pageAttach"><a href="#" title="Attach file" onclick="return false" class="disabled"><span></span>Attach file</a></li> <li class="pageMove"><a href="#" title="Move page" onclick="return false" class="disabled"><span></span>Move page</a></li> <li class="pageDelete"><a href="#" title="Delete page" onclick="return false" class="disabled"><span></span>Delete page</a></li> <li class="pagePrint"><a href="index.php?title=Blackbook_2_and_3&amp;action=print" title="Print page" onclick="return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" class=""><span></span>Print page</a></li> <li class="pageMore"><a href="#" onclick="return DWMenu.Position('menuPageOptions', this, 0, 0);"><span></span>More</a></li> <li class="navSplit"></li> <li class="pageToc"><a href="#" title="Table of contents" onclick="return DWMenu.Position('menuPageContent', this, -2, 0)" class="disabled"><span></span>Table of contents</a></li> </ul> </div> <div class="post"></div> </div> <div class="pageContentFrame"> <div class="custom custom4"> </div> <div id="pageContent" class="pageContent"> <div class="hierarchy"> <span class="dw-hierarchy"><a href="">Federal Data Web 2.0 Wiki Pilot</a> &gt; Blackbook 2 and 3</span> </div> <div class="pageTitle"> <h1 id="title"><span class="pageRestricted" >Blackbook 2 and 3</span></h1> </div> <div class="pageStatus"> </div> <div class="PageDW-Blackbook2and3"> <div id="page-top"><div id="pageToc"><div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div><div class="pageText" id="pageText"> <p>NSA&rsquo;s Blackbook 2 and 3 - The Standard in Semantic Web Technology for Data Management:</p> <p>Blackbook2 is a project architected by Intervise&rsquo;s Chief Technology Officer (Scott Streit), which moved into open source on September 1, 2009. Blackbook2 is a standard for semantic web processing and is currently used, in production or pilots, at the Department of Defense, Dole Foods, and the Environmental Protection Agency, just to name a few. Without changing Blackbook2, merely adding new data, Blackbook2 processes anything from Shipping Visibility Data to classified, analytical processing.</p> <p>For <a class=" external" rel="external nofollow" target="_blank" href="" title="http://www.resumesplanet.com"> resume writers</a>, web application framework for data analysis, Blackbook2's architecture provides secure support for visualization, transformation, data source integration, asynchronous operations, and is vocabulary agnostic. Application programming interfaces (APIs) exist for plugin components that visualize, discover, transform, extract, enrich, or filter graph&#8208;based data such as social networks. Data sources of many types (RDBMs, Documents, RSS) can be mapped into Blackbook2 as RDF/OWL, either by Ingest or real-time mapping solutions such as D2RQ.</p> <p>The Blackbook2 architecture provides asynchronous operations via a message bus backend so that results are provided just-in-time to real&#8208;time users or to workflows that may run for hours. Blackbook2 is vocabulary agnostic: it can provide mapping to a common ontology for all data sources or it can accommodate disparate vocabularies with common vocabulary subsets (e.g., Dublin Core, VCard). Finally, Blackbook2 is accredited for multi-level security via role-based access and provides integrated logging via standard interfaces (JAAS and Log4J).</p> <p>Blackbook 2, and now 3, is available free to Federal government employees and is currently running on the NSA CloudBase Cloud Computing Platform. Software, documentation, and collaboration are available at <a class="external" rel="external nofollow" target="_blank" href="wiki/index.php/Main_Page" title="http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page">http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page</a>&nbsp; by contacting Buster Fields at <a class="link-mailto" rel="external nofollow" target="_blank" href="mailto:hlfield@nsa.gov" title="mailto:hlfield@nsa.gov">hlfield@nsa.gov</a> .</p></div></div><div class="printfooter" id="printfooter"><hr /> <p>Retrieved from "<a href="Blackbook_2_and_3">http://federaldata.Wik.is/Blackbook_2_and_3</a>"</p> </div> </div> </div> </div> <div class="DW-clear"></div> <div class="pageInfo"> <dl> <dt class="pageTags"><span></span>Tag page</dt> <dd class="pageTags"> <div id="pageTags"><div class="pageTagList"><div class="item taglist"></div></div></div> </dd> <dt class="pageIncomingLinks"><span></span>What links here</dt> <dd class="pageIncomingLinks"></dd> </dl> </div> <div class="file"> <h2>Files 0</h2> <div class="fileAdd"> <a href="Blackbook_2_and_3" class="disabled" onclick="return false"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="attach" alt="" /></span><span class="text">Attach file or image</span></a> </div> <div class="fileList"> <div id="pageFiles"><div class="nofiles">&nbsp;</div></div> </div> </div> <div class="gallery"> <h2>Images 0</h2> <div id="pageGalleryWrap"><div class="nofiles">&nbsp;</div></div> </div> <div id="comments"><div class="comments"><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div><div class="comment" id="comment179"><div class="commentNum"><a href="Blackbook_2_and_3#comment179">#179</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm179"></div><div class="commentContent" id="commentText179">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment177"><div class="commentNum"><a href="Blackbook_2_and_3#comment177">#177</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm177"></div><div class="commentContent" id="commentText177">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment176"><div class="commentNum"><a href="Blackbook_2_and_3#comment176">#176</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm176"></div><div class="commentContent" id="commentText176">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment184"><div class="commentNum"><a href="Blackbook_2_and_3#comment184">#184</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm184"></div><div class="commentContent" id="commentText184">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment183"><div class="commentNum"><a href="Blackbook_2_and_3#comment183">#183</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm183"></div><div class="commentContent" id="commentText183">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment182"><div class="commentNum"><a href="Blackbook_2_and_3#comment182">#182</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm182"></div><div class="commentContent" id="commentText182">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment181"><div class="commentNum"><a href="Blackbook_2_and_3#comment181">#181</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm181"></div><div class="commentContent" id="commentText181">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment186"><div class="commentNum"><a href="Blackbook_2_and_3#comment186">#186</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm186"></div><div class="commentContent" id="commentText186">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment185"><div class="commentNum"><a href="Blackbook_2_and_3#comment185">#185</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm185"></div><div class="commentContent" id="commentText185">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment192"><div class="commentNum"><a href="Blackbook_2_and_3#comment192">#192</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm192"></div><div class="commentContent" id="commentText192">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment191"><div class="commentNum"><a href="Blackbook_2_and_3#comment191">#191</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm191"></div><div class="commentContent" id="commentText191">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment190"><div class="commentNum"><a href="Blackbook_2_and_3#comment190">#190</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm190"></div><div class="commentContent" id="commentText190">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment189"><div class="commentNum"><a href="Blackbook_2_and_3#comment189">#189</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm189"></div><div class="commentContent" id="commentText189">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment188"><div class="commentNum"><a href="Blackbook_2_and_3#comment188">#188</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm188"></div><div class="commentContent" id="commentText188">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment187"><div class="commentNum"><a href="Blackbook_2_and_3#comment187">#187</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm187"></div><div class="commentContent" id="commentText187">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div></div><div class="commentForm">You must <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3">login</a> to post a comment.</div></div> <div class="custom custom5"> </div> </div> <div class="bodyFooter"> <div class="pre"></div> <div class="post"></div> </div> <div class="Wik.is"><div class="poweredBy">Powered by <a href=""> Wik.is Express: open source enterprise collaboration and wik software</a></div></div> <div class="sourceforge" style="text-align: center; margin: 8px 0;"><a href="http://wik.is/"><img src="http://wik.is/wp-content/uploads/2015/06/logo1.png" alt=" Wik.is" /></a></div> </div> </div> </div> <script type="text/javascript">var _endtime = new Date().getTime(); var _size = 40215;</script> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuTools" style="display:none;"> <ul> <li class="siteListRss"><a href="Special:ListRss" title="RSS feeds"><span></span>RSS feeds</a></li> <li class="siteListusers"><a href="User:" title="Users"><span></span>Users</a></li> <li class="siteListTemplates"><a href="Template:" title="Templates"><span></span>Templates</a></li> <li class="siteSitemap"><a href="Special:Sitemap" title="Sitemap"><span></span>Sitemap</a></li> <li class="sitePopularpages"><a href="Special:Popularpages" title="Popular pages"><span></span>Popular pages</a></li> <li class="siteAbout"><a href="Special:About" title="About"><span></span>About</a></li> </ul> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageOptions" style="display:none;"> <ul> <li class="pageEdit disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Edit page"><span></span>Edit page</a></li> <li class="pageAdd disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');" title="New page"><span></span>New page</a></li> <li class="pageRestrict disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Restrict access"><span></span>Restrict access</a></li> <li class="pageAttach disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Attach file"><span></span>Attach file</a></li> <li class="pageMove disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Move page"><span></span>Move page</a></li> <li class="pageDelete disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Delete page"><span></span>Delete page</a></li> <li class="pagePrint "><a href="index.php?title=Blackbook_2_and_3&amp;action=print" onclick="menuOff('menuPageOptions');return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" title="Print page"><span></span>Print page</a></li> <li class="pageTags disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Tag"><span></span>Tag</a></li> <li class="pageEmail disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Email link"><span></span>Email link</a></li> <li class="pageProperties disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Set page properties"><span></span>Set page properties</a></li> <li class="pageTalk "><a href="Talk:Blackbook_2_and_3" onclick="menuOff('menuPageOptions');" title="Talk page"><span></span>Talk page</a></li> <li class="pageWatch "><a href="index.php?title=Blackbook_2_and_3&amp;action=watch" onclick="menuOff('menuPageOptions');" title="Watch page"><span></span>Watch page</a></li> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuBacklink" style="display:none;"> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageContent" style="display:none;"> <div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div> <div class="ui-msg-wrap" id="MTMessage" style="display: none;"> <div class="ui-msg ui-errormsg" id="MTMessageStyle"> <div class="ui-msg-opt"> <ul> <li><a href="#" class="dismiss" onclick="return MTMessage.Hide();">dismiss message</a></li> <li><a href="#" class="details" id="MTMessageDetailsLink" onclick="return MTMessage.ShowDetails(this);">view details</a></li> </ul> <div class="ui-msg-autoclose"> <span id="MTMessageUnpaused" style="display: inline;">Message will close by itself in <span id="MTMessageTimer"></span> seconds</span> <span id="MTMessagePaused" style="display: none;">Message timer has been stopped</span> </div> </div> <div class="ui-msg-header" id="MTMessageHeader"></div> <div class="ui-msg-desc" id="MTMessageDesc"></div> <div class="ui-msg-desc" id="MTMessageDetails" style="display: none;"> <p>Viewing Details:</p> </div> </div> </div><div id="menuFiller"></div><div id="bodyHeight"></div><script src="urchin.js" type="text/javascript"></script> <!-- Served by ec2-75-101-202-187.compute-1.amazonaws.com in 1.69 secs. --> <!-- /wik/site/settings: 0.75441813468933--> <!-- /wik/users/=Anonymous: 0.043669939041138--> <!-- /wik/site/services/1: 0.0053939819335938--> <!-- /wik/pages/710/contents: 0.022506952285767--> <!-- /wik/pages/710: 0.061690092086792--> <!-- /wik/pages/710/comments: 0.6609480381012--> <!-- /wik/pages/710/security: 0.019191026687622--> <!-- /wik/site/nav/=Blackbook%2B2%2Band%2B3/full: 0.051814079284668--> <!-- Total: 1.6196322441101--> <!-- Real: 1.6196322441101--> </body> </html> 5b468296ab961ef7a839aa679d29fe37445abcaa 393 392 2016-01-13T16:43:42Z Eddie 1 wikitext text/x-wiki <nowiki><?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us" dir=""> <head> <script type="text/javascript">var _starttime = new Date().getTime();</script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="robots" content="index,follow" /> <link rel="shortcut icon" href="favicon.ico" /> <meta name="generator" content=" Wik.is" /> <link rel="search" type="application/opensearchdescription+xml" title="Federal Data Web 2.0 Wiki Pilot Search" href="/@gui/opensearch/description" /> <title>Blackbook 2 and 3 - Federal Data Web 2.0 Wiki Pilot</title> <!-- default css --> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/_reset.css"/> <link rel="stylesheet" type="text/css" media="screen" href="skins/common/css.php" /> <!--[if IE 7]><style type="text/css">@import "/skins/common/_ie7.css";</style><![endif]--><!--[if IE 6]><style type="text/css">@import "/skins/common/_ie.css";</style><![endif]--> <link rel="stylesheet" type="text/css" media="print" href="skins/common/print.css" /> <!-- default scripting --> <script type="text/javascript" src="skins/common/js.php?perms=LOGIN,BROWSE,READ,SUBSCRIBE&amp;lang=en-us"></script> <!-- specific screen stylesheets--> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/sky-tangerine/css.php"/> <!-- specific print stylesheets --> <link rel="stylesheet" type="text/css" media="print" href="skins/fiesta/print.css" /> <!-- IE6 & IE7 specific stuff --> <!--[if IE]><meta http-equiv="imagetoolbar" content="no" /><![endif]--> <!--[if IE 6]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie6.php"/><![endif]--> <!--[if IE 7]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie7.php"/><![endif]--> <script type="text/javascript"> _page_redirect = false; _path_tpl = '/skins/fiesta'; _path_skin = '/skins/fiesta/sky-tangerine'; _path_common = '/skins/common'; _path_icons = '/skins/common/icons'; editToken = 'f50e1eed8f38fedcfc02890ed226112a'; _userName = 'Anonymous'; _userId = '2'; var _editor_styles_path = ['/skins/fiesta/_editor.css', '/skins/fiesta/sky-tangerine/_content.css', '']; _today = '2 Oct 2010'; baseHref = '/web/20101003032546/http://federaldata.Wik.is'; _page_titlePath = '/'; _page_titleName = 'Blackbook 2 and 3'; _page_ID = 710; _total_images = 6; contextTopic = 'Blackbook 2 and 3'; _over_storage_quota = false; saveFlag = false; // remote scripting library // (c) copyright 2005 modernmethod, inc var sajax_debug_mode = false; var sajax_request_type = "POST"; function sajax_debug(text) { if (sajax_debug_mode) alert("RSD: " + text); }; function sajax_init_object() { sajax_debug("sajax_init_object() called.."); var A = window.XMLHttpRequest ? new XMLHttpRequest() : window.ActiveXObject ? new ActiveXObject("Microsoft.XMLHTTP") : null; if (!A) sajax_debug("Could not create connection object."); return A; }; function _sajax_do_call(x, func_name, args) { var i, x, n; var uri; var post_data; uri = "/index.php"; if (sajax_request_type == "GET") { if (uri.indexOf("?") == -1) uri = uri + "?rs=" + encodeURIComponent(func_name); else uri = uri + "&rs=" + encodeURIComponent(func_name); for (i = 0; i < args.length-1; i++) { var a = args[i]; uri = uri + "&rsargs[]=" + encodeURIComponent(a); } uri = uri + "&rsrnd=" + new Date().getTime(); post_data = null; } else { post_data = "rs=" + func_name; for (i = 0; i < args.length-1; i++) { var a = args[i]; post_data = post_data + "&rsargs[]=" + encodeURIComponent(a); } } x.open(sajax_request_type, uri, true); if (sajax_request_type == "POST") { x.setRequestHeader("Method", "POST " + uri + " HTTP/1.1"); x.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); } x.onreadystatechange = function() { if (x.readyState != 4) return; if (typeof sajax_debug != 'undefined') sajax_debug("received " + x.responseText); var status; var data = x.responseText.replace(/^\s+/, ''); status = data.charAt(0); data = data.substring(2); if (status == "-") alert("Error: " + data); else args[args.length-1](data); } x.send(post_data); sajax_debug(func_name + " uri = " + uri + "/post = " + post_data); sajax_debug(func_name + " waiting.."); return x; }; function sajax_do_call(func_name, args) { x = sajax_init_object(); _sajax_do_call(x, func_name, args); delete x; }; function x_breadcrumbSet() { sajax_do_call("breadcrumbSet", x_breadcrumbSet.arguments); }; function x_wfAdminUserForm() { sajax_do_call("wfAdminUserForm", x_wfAdminUserForm.arguments); }; function x_wfSetUserOption() { sajax_do_call("wfSetUserOption", x_wfSetUserOption.arguments); }; function x_wfSetRestrictions() { sajax_do_call("wfSetRestrictions", x_wfSetRestrictions.arguments); }; function x_setUserOption() { sajax_do_call("setUserOption", x_setUserOption.arguments); }; function x_wfValidateUserOrGroup() { sajax_do_call("wfValidateUserOrGroup", x_wfValidateUserOrGroup.arguments); }; function x_wfSaveEdit() { sajax_do_call("wfSaveEdit", x_wfSaveEdit.arguments); }; function x_wfQueryLinks() { sajax_do_call("wfQueryLinks", x_wfQueryLinks.arguments); }; function x_loadInplaceEditor() { sajax_do_call("loadInplaceEditor", x_loadInplaceEditor.arguments); }; function x_doSetbaseHref() { sajax_do_call("doSetbaseHref", x_doSetbaseHref.arguments); }; function x_showFileAttachments() { sajax_do_call("showFileAttachments", x_showFileAttachments.arguments); }; function x_doSectionEdit() { sajax_do_call("doSectionEdit", x_doSectionEdit.arguments); }; function x_postComment() { sajax_do_call("postComment", x_postComment.arguments); }; function x_getComments() { sajax_do_call("getComments", x_getComments.arguments); }; function x_deleteComment() { sajax_do_call("deleteComment", x_deleteComment.arguments); }; function x_editComment() { sajax_do_call("editComment", x_editComment.arguments); }; function x_wfEmailPage() { sajax_do_call("wfEmailPage", x_wfEmailPage.arguments); }; function x_wfCheckNewTitle() { sajax_do_call("wfCheckNewTitle", x_wfCheckNewTitle.arguments); }; function x_wfDeleteFile() { sajax_do_call("wfDeleteFile", x_wfDeleteFile.arguments); }; function x_wfSetPageProperties() { sajax_do_call("wfSetPageProperties", x_wfSetPageProperties.arguments); }; function x_wfDeleteTopic() { sajax_do_call("wfDeleteTopic", x_wfDeleteTopic.arguments); }; function x_wfRenameTopic() { sajax_do_call("wfRenameTopic", x_wfRenameTopic.arguments); }; function x_wfMoveAttachments() { sajax_do_call("wfMoveAttachments", x_wfMoveAttachments.arguments); }; function x_wfGetAttachmentUrl() { sajax_do_call("wfGetAttachmentUrl", x_wfGetAttachmentUrl.arguments); }; function x_wfInlineImageGallery() { sajax_do_call("wfInlineImageGallery", x_wfInlineImageGallery.arguments); }; function x_wfSetFileDescription() { sajax_do_call("wfSetFileDescription", x_wfSetFileDescription.arguments); }; function x_wfChangeLoginView() { sajax_do_call("wfChangeLoginView", x_wfChangeLoginView.arguments); }; function x_wfChangeLoginViewToCreate() { sajax_do_call("wfChangeLoginViewToCreate", x_wfChangeLoginViewToCreate.arguments); }; function x_wfSaveCredsToSession() { sajax_do_call("wfSaveCredsToSession", x_wfSaveCredsToSession.arguments); }; function x_wfChangeAddServiceView() { sajax_do_call("wfChangeAddServiceView", x_wfChangeAddServiceView.arguments); }; function x_wfSaveLoginPageCreds() { sajax_do_call("wfSaveLoginPageCreds", x_wfSaveLoginPageCreds.arguments); }; function x_wfRemindPassword() { sajax_do_call("wfRemindPassword", x_wfRemindPassword.arguments); }; function x_wfChangeAvailUsersPage() { sajax_do_call("wfChangeAvailUsersPage", x_wfChangeAvailUsersPage.arguments); }; window.onbeforeunload = checkForChanges; function checkForChanges() { if (saveFlag && !doCheckChanges(cur_editor)) { return "You have made changes to the content without saving your changes. Are you sure you want to exit this page?"; } } var aLt = new Array();aLt["attach-no-description"] = 'No description'; aLt["cancel"] = 'Cancel'; aLt["comment-delete"] = 'Are you sure you want to delete this comment?'; aLt["gallery-close"] = 'close'; aLt["gallery-next"] = 'next'; aLt["gallery-prev"] = 'prev'; aLt["internal-error"] = 'Sorry, but there was an internal problem - please try again soon.'; aLt["js-label_cancel"] = 'Cancel'; aLt["js-label_save"] = 'Save'; aLt["js-tooltip_cancel"] = 'Exit Without Saving Changes'; aLt["js-tooltip_save"] = 'Save and Exit (Alt+S)'; aLt["ldap-provide-credentials"] = 'Please provide external service login credentials.'; aLt["loading"] = 'Loading...'; aLt["menu-confirm-delete"] = 'Are you sure you want to delete this file?'; aLt["menu-delete-file"] = 'Delete'; aLt["menu-edit-description"] = 'Edit description'; aLt["menu-move-file"] = 'Move'; aLt["menu-previous-versions"] = 'Previous versions'; aLt["menu-view-original"] = 'View original'; aLt["print-end-notes"] = 'Endnotes'; aLt["ready"] = 'Ready'; aLt["submit"] = 'Submit'; aLt["select-files"] = 'Select files...'; aLt["wikibits-attach-another"] = 'Attach another file'; aLt["wikibits-attach-file"] = 'Attach File'; aLt["wikibits-cant-attach-editing"] = 'Sorry, you can\'t attach files while editing a page. Please close the editor first.'; aLt["wikibits-edit-section"] = 'Edit section'; aLt["wikibits-remove-file"] = 'Remove file'; var wfMsg = function (key) { return aLt[key] ? aLt[key] : 'MISSING: ' + key; };var navMaxWidth = 1600; //hook in menu clicking events to the document's body YAHOO.util.Event.addListener(document, "click", function () { FileMenu.bodyClick(); DWMenu.BodyClick(); }); YAHOO.util.Event.onDOMReady(function () { new clientWindow }); YAHOO.util.Event.onAvailable("siteNavTree", wik.nav.init, wik.nav, true); YAHOO.util.Event.onDOMReady(function() { tb_init('a.lightbox, area.lightbox, input.lightbox, a[@rel=awesomebox]');//pass where to apply thickbox imgLoader = new Image();// preload image imgLoader.src = tb_pathToImage; }); YAHOO.util.Event.onDOMReady(function() { MTComments.HookBehavior(); }); </script> <!-- styles overwritten via control panel - load this css last --> </head> <body class=" en-us"> <noscript>This application requires Javascript to be enabled.</noscript> <div class="global"> <div class="globalWrap"> <div class="header"> <div class="mastPre"></div> <div class="mast"> <div class="siteLogo"> <a href="" title="Federal Data Web 2.0 Wiki Pilot"><img src="skins/fiesta/sky-tangerine/logo.png" alt="Federal Data Web 2.0 Wiki Pilot" title="Federal Data Web 2.0 Wiki Pilot"/></a> </div> </div> <div class="mastPost"></div> <div class="siteNavPre"></div> <div class="siteNav"> <div class="userAuthPre"></div> <div class="userAuth"> <span>Logged in:</span> <span>Logged in as:</span> <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3" class="userLogin">Log in</a> </div> <div class="userAuthPost"></div> <div class="custom custom2"> </div> <div class="navPre"></div> <div id="siteNavTree"><div class="node dockedNode homeNode lastDocked parentClosed" id="n21" c="n2348,n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n46,n842,n498,n418,n75,n73,n654,n1883,n534,n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757" path=""><a href="" title="Federal Data Web 2.0 Wiki Pilot"><span>Federal Data Web 2....</span></a></div><div class="node childNode sibling" id="n2348" p="n21" path="Analytics/"><a href="Analytics" title="Analytics"><span>Analytics</span></a></div><div class="node childNode sibling selected" id="n710" p="n21" path="Blackbook_2_and_3/"><a href="Blackbook_2_and_3" title="Blackbook 2 and 3"><span>Blackbook 2 and 3</span></a></div><div class="node childNode sibling" id="n70" p="n21" path="Blog_(Web_Log)/"><a href="Blog_(Web_Log)" title="Blog (Web Log)"><span>Blog (Web Log)</span></a></div><div class="node childNode sibling" id="n542" p="n21" path="Cambridge_Semantics_Recovery.gov/"><a href="Cambridge_Semantics_Recovery.gov" title="Cambridge Semantics Recovery.gov"><span>Cambridge Semantic...</span></a></div><div class="node childNode sibling" id="n497" p="n21" path="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive/"><a href="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive" title="Comments and Innovations for the Open Government and Transparency Directive"><span>Comments and Innov...</span></a></div><div class="node childNode sibling" id="n1144" p="n21" path="Data.gov/"><a href="Data.gov" title="Data.gov Adds Geoviewer"><span>Data.gov Adds Geovi...</span></a></div><div class="node childNode sibling" id="n702" p="n21" path="Data.gov_Concept_of_Operations_v0.7/"><a href="Data.gov_Concept_of_Operations_v0.7" title="Data.gov Concept of Operations"><span>Data.gov Concept of...</span></a></div><div class="node childNode sibling" id="n2349" p="n21" path="Data.gov_CONOPS/"><a href="Data.gov_CONOPS" title="Data.gov CONOPS"><span>Data.gov CONOPS</span></a></div><div class="node childNode sibling" id="n1437" p="n21" path="Data.gov%2fsemantic/"><a href="Data.gov%2f%2fsemantic" title="Data.gov/semantic"><span>Data.gov/semantic</span></a></div><div class="node childNode sibling parentClosed" id="n2346" p="n21" path="Data_Science/" cd="0"><a href="Data_Science" title="Data Science"><span>Data Science</span></a></div><div class="node childNode sibling" id="n990" p="n21" path="Executive_Office_of_the_President_-_OMB_and_NSA_Detail/"><a href="Executive_Office_of_the_President_-_OMB_and_NSA_Detail" title="Executive Office of the President - OMB and NSA Detail for Data.gov"><span>Executive Office of ...</span></a></div><div class="node childNode sibling parentClosed" id="n35" p="n21" path="Federal_Data_Architecture_Subcommittee_(DAS)/" cd="0"><a href="Federal_Data_Architecture_Subcommittee_(DAS)" title="Federal Data Architecture Subcommittee (DAS)"><span>Federal Data Archite...</span></a></div><div class="node childNode sibling" id="n33" p="n21" path="Federal_Data_Reference_Model/"><a href="Federal_Data_Reference_Model" title="Federal Data Reference Model"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n34" p="n21" path="Federal_Data_Reference_Model_2.0/" cd="0"><a href="Federal_Data_Reference_Model_2.0" title="Federal Data Reference Model 2.0"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n526" p="n21" path="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form/" cd="0"><a href="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form" title="Federal Enterprise Architecture Reference Model Revision Submission Form (DRM 3.0)"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling parentClosed" id="n543" p="n21" path="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0/" cd="0"><a href="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0" title="Federal Enterprise Architecture Security and Privacy Profile Version 3.0"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling" id="n1884" p="n21" path="Federal_IT_Dashboard/"><a href="Federal_IT_Dashboard" title="Federal IT Dashboard"><span>Federal IT Dashboar...</span></a></div><div class="node childNode sibling parentClosed" id="n46" p="n21" path="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)/" cd="0"><a href="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)" title="Federal Semantic Interoperability Community of Practice (SICoP)"><span>Federal Semantic Int...</span></a></div><div class="node childNode sibling" id="n842" p="n21" path="FGDC_Standards_WG_meeting_-_February_23,_2010/"><a href="FGDC_Standards_WG_meeting_-_February_23%2c_2010" title="FGDC Standards WG Meeting - February 23, 2010"><span>FGDC Standards WG ...</span></a></div><div class="node childNode sibling" id="n498" p="n21" path="George_Thomas_on_Recovery.gov/"><a href="George_Thomas_on_Recovery.gov" title="George Thomas on Recovery.gov"><span>George Thomas on R...</span></a></div><div class="node childNode sibling parentClosed" id="n418" p="n21" path="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society/" cd="0"><a href="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society" title="Harnessing the Power of Digital Data for Science and Society"><span>Harnessing the Powe...</span></a></div><div class="node childNode sibling" id="n75" p="n21" path="Interagency_Forum_on_Data_Preservation,_Stewardship,_and_LifeCycle_ESIP_Federation_Meeting,_January_8,_2009/"><a href="Interagency_Forum_on_Data_Preservation%2c_Stewardship%2c_and_LifeCycle_ESIP_Federation_Meeting%2c_January_8%2c_2009" title="Interagency Forum on Data Preservation, Stewardship, and LifeCycle ESIP Federation Meeting, January 8, 2009"><span>Interagency Forum o...</span></a></div><div class="node childNode sibling parentClosed" id="n73" p="n21" path="Interagency_Working_Group_on_Digitial_Data/" cd="0"><a href="Interagency_Working_Group_on_Digitial_Data" title="Interagency Working Group on Digitial Data"><span>Interagency Working...</span></a></div><div class="node childNode sibling" id="n654" p="n21" path="June_4,_2009_How_Does_Government_Become_an_Open_Platform?/"><a href="June_4%2c_2009_How_Does_Government_Become_an_Open_Platform%3f" title="June 4, 2009 How Does Government Become an Open Platform?"><span>June 4, 2009 How Do...</span></a></div><div class="node childNode sibling" id="n1883" p="n21" path="Labor's_Enforcement_Data_Catalog/"><a href="Labor's_Enforcement_Data_Catalog" title="Labor's Enforcement Data Catalog"><span>Labor's Enforcement...</span></a></div><div class="node childNode sibling moreNodes" id="n534" p="n21" path="May_13,_2009_Semantic_Web_Meetup/" content="May 13, 2009 Seman..." contentTitle="May 13, 2009 Semantic Web Meetup" hiddenNodes="n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757"><a href="May_13%2c_2009_Semantic_Web_Meetup" title="More..."><span class="more">...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2368" p="n21" path="Model_for_Performance-Driven_Government/" cd="0"><a href="Model_for_Performance-Driven_Government" title="Model for Performance-Driven Government"><span>Model for Performan...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n704" p="n21" path="NIEM/"><a href="NIEM" title="NIEM"><span>NIEM</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n661" p="n21" path="Open_Group_Enterprise_Vocabularly_Workshop_June_3,_2009/"><a href="Open_Group_Enterprise_Vocabularly_Workshop_June_3%2c_2009" title="Open Group Enterprise Vocabularly Workshop June 3, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n653" p="n21" path="Open_Group_Enterprise_Vocabulary_Workshop_May_20,_2009/"><a href="Open_Group_Enterprise_Vocabulary_Workshop_May_20%2c_2009" title="Open Group Enterprise Vocabulary Workshop May 20, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n711" p="n21" path="Page_Title/"><a href="Page_Title" title="Open Government Directive Workshop, January 11, 2010"><span>Open Government Di...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1473" p="n21" path="Scientific_Data_Management_for_Government_Agencies/"><a href="Scientific_Data_Management_for_Government_Agencies" title="Scientific Data Management for Government Agencies"><span>Scientific Data Mana...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2352" p="n21" path="Semantic_eScience/" cd="0"><a href="Semantic_eScience" title="Semantic eScience"><span>Semantic eScience</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n427" p="n21" path="Statistical_Abstract_of_the_United_States:_2009/" cd="0"><a href="Statistical_Abstract_of_the_United_States%3a_2009" title="Statistical Abstract of the United States: 2009"><span>Statistical Abstract ...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1140" p="n21" path="Statistics/" cd="0"><a href="Statistics" title="Statistics"><span>Statistics</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2287" p="n21" path="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010/" cd="0"><a href="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010" title="Survey of EPA and Other Federal Agency Scientific Data Management Policies and Guidance 2010"><span>Survey of EPA and O...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n581" p="n21" path="The_Recovery_Dialogue_on_IT_Solutions/" cd="0"><a href="The_Recovery_Dialogue_on_IT_Solutions" title="The Recovery Dialogue on IT Solutions"><span>The Recovery Dialog...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n695" p="n21" path="Tools_for_linked_data_from_DERI/"><a href="Tools_for_linked_data_from_DERI" title="Tools for linked data from DERI"><span>Tools for linked dat...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1935" p="n21" path="Top_Secret_America/"><a href="Top_Secret_America" title="Top Secret America"><span>Top Secret America</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1134" p="n21" path="Ucore-SL/" cd="0"><a href="Ucore-SL" title="Ucore-SL"><span>Ucore-SL</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n500" p="n21" path="W3C_eGovernment_Interest_Group/" cd="0"><a href="W3C_eGovernment_Interest_Group" title="W3C eGovernment Interest Group"><span>W3C eGovernment In...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n2359" p="n21" path="Watershed_Boundary_Dataset/"><a href="Watershed_Boundary_Dataset" title="Watershed Boundary Dataset"><span>Watershed Boundary ...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1757" p="n21" path="White_House_Salaries/"><a href="White_House_Salaries" title="White House Salaries"><span>White House Salarie...</span></a></div></div> <div class="navPost"></div> <div class="custom"> </div> </div> <div class="siteNavPost"></div> </div> <div class="body"> <div class="bodyHeader"> <div class="pre"></div> <div class="post"></div> </div> <div class="page"> <!-- required print options --> <div class="custom custom1"> </div> <div class="siteNav"> <div class="pre"></div> <div class="siteSearch"> <fieldset class="search"> <form action="Special:Search"> <span>Search: </span><input id="searchInput" class="inputText" name="search" type="text" value="" /> <input type="hidden" name="type" value="fulltext" /> <input type="submit" name="go" class="inputSubmit" value="Find" /> </form> </fieldset> </div> <ul> <li class="userPage"><a href="User:Anonymous"><span></span>My Page</a></li> <li class="siteChanges"><a href="Special:Recentchanges"><span></span>Recent changes</a></li> <li class="siteTools"><a href="#" onclick="return DWMenu.Position('menuTools', this, 0, 0);"><span></span>Tools</a></li> <li class="siteHelp"><a href="Resources/Documentation/FAQ/MindTouch_Express"><span></span>Help</a></li> <li class="siteHelp"><a href="pro/"><span></span>Go Pro</a></li> </ul> <div class="post"></div> </div> <div class="pageBar"> <div class="pre"></div> <div class="pageRevision"> <!-- last modified --> Page last modified <a href="index.php?title=Blackbook_2_and_3&amp;action=history" title="20:27, 15 Feb 2010">20:27, 15 Feb 2010</a> by <a href="User:LucasGraim" class="link-user" rel="internal">LucasGraim</a> <!-- end last modified --> </div> <div class="pageNav"> <ul> <li class="pageEdit"><a href="#" title="Edit page" onclick="return false" class="disabled"><span></span>Edit page</a></li> <li class="pageAdd"><a href="#" title="New page" class="disabled"><span></span>New page</a></li> <li class="pageRestrict"><a href="#" title="Restrict access" onclick="return false" class="disabled"><span></span>Restrict access</a></li> <li class="pageAttach"><a href="#" title="Attach file" onclick="return false" class="disabled"><span></span>Attach file</a></li> <li class="pageMove"><a href="#" title="Move page" onclick="return false" class="disabled"><span></span>Move page</a></li> <li class="pageDelete"><a href="#" title="Delete page" onclick="return false" class="disabled"><span></span>Delete page</a></li> <li class="pagePrint"><a href="index.php?title=Blackbook_2_and_3&amp;action=print" title="Print page" onclick="return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" class=""><span></span>Print page</a></li> <li class="pageMore"><a href="#" onclick="return DWMenu.Position('menuPageOptions', this, 0, 0);"><span></span>More</a></li> <li class="navSplit"></li> <li class="pageToc"><a href="#" title="Table of contents" onclick="return DWMenu.Position('menuPageContent', this, -2, 0)" class="disabled"><span></span>Table of contents</a></li> </ul> </div> <div class="post"></div> </div> <div class="pageContentFrame"> <div class="custom custom4"> </div> <div id="pageContent" class="pageContent"> <div class="hierarchy"> <span class="dw-hierarchy"><a href="">Federal Data Web 2.0 Wiki Pilot</a> &gt; Blackbook 2 and 3</span> </div> <div class="pageTitle"> <h1 id="title"><span class="pageRestricted" >Blackbook 2 and 3</span></h1> </div> <div class="pageStatus"> </div> <div class="PageDW-Blackbook2and3"> <div id="page-top"><div id="pageToc"><div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div><div class="pageText" id="pageText"> <p>NSA&rsquo;s Blackbook 2 and 3 - The Standard in Semantic Web Technology for Data Management:</p> <p>Blackbook2 is a project architected by Intervise&rsquo;s Chief Technology Officer (Scott Streit), which moved into open source on September 1, 2009. Blackbook2 is a standard for semantic web processing and is currently used, in production or pilots, at the Department of Defense, Dole Foods, and the Environmental Protection Agency, just to name a few. Without changing Blackbook2, merely adding new data, Blackbook2 processes anything from Shipping Visibility Data to classified, analytical processing.</p> <p>For <a class=" external" rel="external nofollow" target="_blank" href="" title="http://www.resumesplanet.com"> resume writers</a>, web application framework for data analysis, Blackbook2's architecture provides secure support for visualization, transformation, data source integration, asynchronous operations, and is vocabulary agnostic. Application programming interfaces (APIs) exist for plugin components that visualize, discover, transform, extract, enrich, or filter graph&#8208;based data such as social networks. Data sources of many types (RDBMs, Documents, RSS) can be mapped into Blackbook2 as RDF/OWL, either by Ingest or real-time mapping solutions such as D2RQ.</p> <p>The Blackbook2 architecture provides asynchronous operations via a message bus backend so that results are provided just-in-time to real&#8208;time users or to workflows that may run for hours. Blackbook2 is vocabulary agnostic: it can provide mapping to a common ontology for all data sources or it can accommodate disparate vocabularies with common vocabulary subsets (e.g., Dublin Core, VCard). Finally, Blackbook2 is accredited for multi-level security via role-based access and provides integrated logging via standard interfaces (JAAS and Log4J).</p> <p>Blackbook 2, and now 3, is available free to Federal government employees and is currently running on the NSA CloudBase Cloud Computing Platform. Software, documentation, and collaboration are available at <a class="external" rel="external nofollow" target="_blank" href="wiki/index.php/Main_Page" title="http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page">http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page</a>&nbsp; by contacting Buster Fields at <a class="link-mailto" rel="external nofollow" target="_blank" href="mailto:hlfield@nsa.gov" title="mailto:hlfield@nsa.gov">hlfield@nsa.gov</a> .</p></div></div><div class="printfooter" id="printfooter"><hr /> <p>Retrieved from "<a href="Blackbook_2_and_3">http://federaldata.Wik.is/Blackbook_2_and_3</a>"</p> </div> </div> </div> </div> <div class="DW-clear"></div> <div class="pageInfo"> <dl> <dt class="pageTags"><span></span>Tag page</dt> <dd class="pageTags"> <div id="pageTags"><div class="pageTagList"><div class="item taglist"></div></div></div> </dd> <dt class="pageIncomingLinks"><span></span>What links here</dt> <dd class="pageIncomingLinks"></dd> </dl> </div> <div class="file"> <h2>Files 0</h2> <div class="fileAdd"> <a href="Blackbook_2_and_3" class="disabled" onclick="return false"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="attach" alt="" /></span><span class="text">Attach file or image</span></a> </div> <div class="fileList"> <div id="pageFiles"><div class="nofiles">&nbsp;</div></div> </div> </div> <div class="gallery"> <h2>Images 0</h2> <div id="pageGalleryWrap"><div class="nofiles">&nbsp;</div></div> </div> <div id="comments"><div class="comments"><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div><div class="comment" id="comment179"><div class="commentNum"><a href="Blackbook_2_and_3#comment179">#179</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm179"></div><div class="commentContent" id="commentText179">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment177"><div class="commentNum"><a href="Blackbook_2_and_3#comment177">#177</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm177"></div><div class="commentContent" id="commentText177">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment176"><div class="commentNum"><a href="Blackbook_2_and_3#comment176">#176</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm176"></div><div class="commentContent" id="commentText176">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment184"><div class="commentNum"><a href="Blackbook_2_and_3#comment184">#184</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm184"></div><div class="commentContent" id="commentText184">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment183"><div class="commentNum"><a href="Blackbook_2_and_3#comment183">#183</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm183"></div><div class="commentContent" id="commentText183">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment182"><div class="commentNum"><a href="Blackbook_2_and_3#comment182">#182</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm182"></div><div class="commentContent" id="commentText182">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment181"><div class="commentNum"><a href="Blackbook_2_and_3#comment181">#181</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm181"></div><div class="commentContent" id="commentText181">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment186"><div class="commentNum"><a href="Blackbook_2_and_3#comment186">#186</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm186"></div><div class="commentContent" id="commentText186">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment185"><div class="commentNum"><a href="Blackbook_2_and_3#comment185">#185</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm185"></div><div class="commentContent" id="commentText185">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment192"><div class="commentNum"><a href="Blackbook_2_and_3#comment192">#192</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm192"></div><div class="commentContent" id="commentText192">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment191"><div class="commentNum"><a href="Blackbook_2_and_3#comment191">#191</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm191"></div><div class="commentContent" id="commentText191">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment190"><div class="commentNum"><a href="Blackbook_2_and_3#comment190">#190</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm190"></div><div class="commentContent" id="commentText190">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment189"><div class="commentNum"><a href="Blackbook_2_and_3#comment189">#189</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm189"></div><div class="commentContent" id="commentText189">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment188"><div class="commentNum"><a href="Blackbook_2_and_3#comment188">#188</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm188"></div><div class="commentContent" id="commentText188">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment187"><div class="commentNum"><a href="Blackbook_2_and_3#comment187">#187</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm187"></div><div class="commentContent" id="commentText187">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div></div><div class="commentForm">You must <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3">login</a> to post a comment.</div></div> <div class="custom custom5"> </div> </div> <div class="bodyFooter"> <div class="pre"></div> <div class="post"></div> </div> <div class="Wik.is"><div class="poweredBy">Powered by <a href=""> Wik.is Express: open source enterprise collaboration and wik software</a></div></div> <div class="sourceforge" style="text-align: center; margin: 8px 0;"><a href="http://wik.is/"><img src="http://wik.is/wp-content/uploads/2015/06/logo1.png" alt=" Wik.is" /></a></div> </div> </div> </div> <script type="text/javascript">var _endtime = new Date().getTime(); var _size = 40215;</script> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuTools" style="display:none;"> <ul> <li class="siteListRss"><a href="Special:ListRss" title="RSS feeds"><span></span>RSS feeds</a></li> <li class="siteListusers"><a href="User:" title="Users"><span></span>Users</a></li> <li class="siteListTemplates"><a href="Template:" title="Templates"><span></span>Templates</a></li> <li class="siteSitemap"><a href="Special:Sitemap" title="Sitemap"><span></span>Sitemap</a></li> <li class="sitePopularpages"><a href="Special:Popularpages" title="Popular pages"><span></span>Popular pages</a></li> <li class="siteAbout"><a href="Special:About" title="About"><span></span>About</a></li> </ul> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageOptions" style="display:none;"> <ul> <li class="pageEdit disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Edit page"><span></span>Edit page</a></li> <li class="pageAdd disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');" title="New page"><span></span>New page</a></li> <li class="pageRestrict disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Restrict access"><span></span>Restrict access</a></li> <li class="pageAttach disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Attach file"><span></span>Attach file</a></li> <li class="pageMove disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Move page"><span></span>Move page</a></li> <li class="pageDelete disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Delete page"><span></span>Delete page</a></li> <li class="pagePrint "><a href="index.php?title=Blackbook_2_and_3&amp;action=print" onclick="menuOff('menuPageOptions');return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" title="Print page"><span></span>Print page</a></li> <li class="pageTags disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Tag"><span></span>Tag</a></li> <li class="pageEmail disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Email link"><span></span>Email link</a></li> <li class="pageProperties disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Set page properties"><span></span>Set page properties</a></li> <li class="pageTalk "><a href="Talk:Blackbook_2_and_3" onclick="menuOff('menuPageOptions');" title="Talk page"><span></span>Talk page</a></li> <li class="pageWatch "><a href="index.php?title=Blackbook_2_and_3&amp;action=watch" onclick="menuOff('menuPageOptions');" title="Watch page"><span></span>Watch page</a></li> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuBacklink" style="display:none;"> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageContent" style="display:none;"> <div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div> <div class="ui-msg-wrap" id="MTMessage" style="display: none;"> <div class="ui-msg ui-errormsg" id="MTMessageStyle"> <div class="ui-msg-opt"> <ul> <li><a href="#" class="dismiss" onclick="return MTMessage.Hide();">dismiss message</a></li> <li><a href="#" class="details" id="MTMessageDetailsLink" onclick="return MTMessage.ShowDetails(this);">view details</a></li> </ul> <div class="ui-msg-autoclose"> <span id="MTMessageUnpaused" style="display: inline;">Message will close by itself in <span id="MTMessageTimer"></span> seconds</span> <span id="MTMessagePaused" style="display: none;">Message timer has been stopped</span> </div> </div> <div class="ui-msg-header" id="MTMessageHeader"></div> <div class="ui-msg-desc" id="MTMessageDesc"></div> <div class="ui-msg-desc" id="MTMessageDetails" style="display: none;"> <p>Viewing Details:</p> </div> </div> </div><div id="menuFiller"></div><div id="bodyHeight"></div><script src="urchin.js" type="text/javascript"></script> <!-- Served by ec2-75-101-202-187.compute-1.amazonaws.com in 1.69 secs. --> <!-- /wik/site/settings: 0.75441813468933--> <!-- /wik/users/=Anonymous: 0.043669939041138--> <!-- /wik/site/services/1: 0.0053939819335938--> <!-- /wik/pages/710/contents: 0.022506952285767--> <!-- /wik/pages/710: 0.061690092086792--> <!-- /wik/pages/710/comments: 0.6609480381012--> <!-- /wik/pages/710/security: 0.019191026687622--> <!-- /wik/site/nav/=Blackbook%2B2%2Band%2B3/full: 0.051814079284668--> <!-- Total: 1.6196322441101--> <!-- Real: 1.6196322441101--> </body> </html> </nowiki> 1375eeee39624fec67e64330fe14e3f44a0a64da 394 393 2016-01-13T16:44:53Z Eddie 1 Undo revision 393 by [[Special:Contributions/Eddie|Eddie]] ([[User talk:Eddie|talk]]) wikitext text/x-wiki <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us" dir=""> <head> <script type="text/javascript">var _starttime = new Date().getTime();</script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="robots" content="index,follow" /> <link rel="shortcut icon" href="favicon.ico" /> <meta name="generator" content=" Wik.is" /> <link rel="search" type="application/opensearchdescription+xml" title="Federal Data Web 2.0 Wiki Pilot Search" href="/@gui/opensearch/description" /> <title>Blackbook 2 and 3 - Federal Data Web 2.0 Wiki Pilot</title> <!-- default css --> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/_reset.css"/> <link rel="stylesheet" type="text/css" media="screen" href="skins/common/css.php" /> <!--[if IE 7]><style type="text/css">@import "/skins/common/_ie7.css";</style><![endif]--><!--[if IE 6]><style type="text/css">@import "/skins/common/_ie.css";</style><![endif]--> <link rel="stylesheet" type="text/css" media="print" href="skins/common/print.css" /> <!-- default scripting --> <script type="text/javascript" src="skins/common/js.php?perms=LOGIN,BROWSE,READ,SUBSCRIBE&amp;lang=en-us"></script> <!-- specific screen stylesheets--> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/sky-tangerine/css.php"/> <!-- specific print stylesheets --> <link rel="stylesheet" type="text/css" media="print" href="skins/fiesta/print.css" /> <!-- IE6 & IE7 specific stuff --> <!--[if IE]><meta http-equiv="imagetoolbar" content="no" /><![endif]--> <!--[if IE 6]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie6.php"/><![endif]--> <!--[if IE 7]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie7.php"/><![endif]--> <script type="text/javascript"> _page_redirect = false; _path_tpl = '/skins/fiesta'; _path_skin = '/skins/fiesta/sky-tangerine'; _path_common = '/skins/common'; _path_icons = '/skins/common/icons'; editToken = 'f50e1eed8f38fedcfc02890ed226112a'; _userName = 'Anonymous'; _userId = '2'; var _editor_styles_path = ['/skins/fiesta/_editor.css', '/skins/fiesta/sky-tangerine/_content.css', '']; _today = '2 Oct 2010'; baseHref = '/web/20101003032546/http://federaldata.Wik.is'; _page_titlePath = '/'; _page_titleName = 'Blackbook 2 and 3'; _page_ID = 710; _total_images = 6; contextTopic = 'Blackbook 2 and 3'; _over_storage_quota = false; saveFlag = false; // remote scripting library // (c) copyright 2005 modernmethod, inc var sajax_debug_mode = false; var sajax_request_type = "POST"; function sajax_debug(text) { if (sajax_debug_mode) alert("RSD: " + text); }; function sajax_init_object() { sajax_debug("sajax_init_object() called.."); var A = window.XMLHttpRequest ? new XMLHttpRequest() : window.ActiveXObject ? new ActiveXObject("Microsoft.XMLHTTP") : null; if (!A) sajax_debug("Could not create connection object."); return A; }; function _sajax_do_call(x, func_name, args) { var i, x, n; var uri; var post_data; uri = "/index.php"; if (sajax_request_type == "GET") { if (uri.indexOf("?") == -1) uri = uri + "?rs=" + encodeURIComponent(func_name); else uri = uri + "&rs=" + encodeURIComponent(func_name); for (i = 0; i < args.length-1; i++) { var a = args[i]; uri = uri + "&rsargs[]=" + encodeURIComponent(a); } uri = uri + "&rsrnd=" + new Date().getTime(); post_data = null; } else { post_data = "rs=" + func_name; for (i = 0; i < args.length-1; i++) { var a = args[i]; post_data = post_data + "&rsargs[]=" + encodeURIComponent(a); } } x.open(sajax_request_type, uri, true); if (sajax_request_type == "POST") { x.setRequestHeader("Method", "POST " + uri + " HTTP/1.1"); x.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); } x.onreadystatechange = function() { if (x.readyState != 4) return; if (typeof sajax_debug != 'undefined') sajax_debug("received " + x.responseText); var status; var data = x.responseText.replace(/^\s+/, ''); status = data.charAt(0); data = data.substring(2); if (status == "-") alert("Error: " + data); else args[args.length-1](data); } x.send(post_data); sajax_debug(func_name + " uri = " + uri + "/post = " + post_data); sajax_debug(func_name + " waiting.."); return x; }; function sajax_do_call(func_name, args) { x = sajax_init_object(); _sajax_do_call(x, func_name, args); delete x; }; function x_breadcrumbSet() { sajax_do_call("breadcrumbSet", x_breadcrumbSet.arguments); }; function x_wfAdminUserForm() { sajax_do_call("wfAdminUserForm", x_wfAdminUserForm.arguments); }; function x_wfSetUserOption() { sajax_do_call("wfSetUserOption", x_wfSetUserOption.arguments); }; function x_wfSetRestrictions() { sajax_do_call("wfSetRestrictions", x_wfSetRestrictions.arguments); }; function x_setUserOption() { sajax_do_call("setUserOption", x_setUserOption.arguments); }; function x_wfValidateUserOrGroup() { sajax_do_call("wfValidateUserOrGroup", x_wfValidateUserOrGroup.arguments); }; function x_wfSaveEdit() { sajax_do_call("wfSaveEdit", x_wfSaveEdit.arguments); }; function x_wfQueryLinks() { sajax_do_call("wfQueryLinks", x_wfQueryLinks.arguments); }; function x_loadInplaceEditor() { sajax_do_call("loadInplaceEditor", x_loadInplaceEditor.arguments); }; function x_doSetbaseHref() { sajax_do_call("doSetbaseHref", x_doSetbaseHref.arguments); }; function x_showFileAttachments() { sajax_do_call("showFileAttachments", x_showFileAttachments.arguments); }; function x_doSectionEdit() { sajax_do_call("doSectionEdit", x_doSectionEdit.arguments); }; function x_postComment() { sajax_do_call("postComment", x_postComment.arguments); }; function x_getComments() { sajax_do_call("getComments", x_getComments.arguments); }; function x_deleteComment() { sajax_do_call("deleteComment", x_deleteComment.arguments); }; function x_editComment() { sajax_do_call("editComment", x_editComment.arguments); }; function x_wfEmailPage() { sajax_do_call("wfEmailPage", x_wfEmailPage.arguments); }; function x_wfCheckNewTitle() { sajax_do_call("wfCheckNewTitle", x_wfCheckNewTitle.arguments); }; function x_wfDeleteFile() { sajax_do_call("wfDeleteFile", x_wfDeleteFile.arguments); }; function x_wfSetPageProperties() { sajax_do_call("wfSetPageProperties", x_wfSetPageProperties.arguments); }; function x_wfDeleteTopic() { sajax_do_call("wfDeleteTopic", x_wfDeleteTopic.arguments); }; function x_wfRenameTopic() { sajax_do_call("wfRenameTopic", x_wfRenameTopic.arguments); }; function x_wfMoveAttachments() { sajax_do_call("wfMoveAttachments", x_wfMoveAttachments.arguments); }; function x_wfGetAttachmentUrl() { sajax_do_call("wfGetAttachmentUrl", x_wfGetAttachmentUrl.arguments); }; function x_wfInlineImageGallery() { sajax_do_call("wfInlineImageGallery", x_wfInlineImageGallery.arguments); }; function x_wfSetFileDescription() { sajax_do_call("wfSetFileDescription", x_wfSetFileDescription.arguments); }; function x_wfChangeLoginView() { sajax_do_call("wfChangeLoginView", x_wfChangeLoginView.arguments); }; function x_wfChangeLoginViewToCreate() { sajax_do_call("wfChangeLoginViewToCreate", x_wfChangeLoginViewToCreate.arguments); }; function x_wfSaveCredsToSession() { sajax_do_call("wfSaveCredsToSession", x_wfSaveCredsToSession.arguments); }; function x_wfChangeAddServiceView() { sajax_do_call("wfChangeAddServiceView", x_wfChangeAddServiceView.arguments); }; function x_wfSaveLoginPageCreds() { sajax_do_call("wfSaveLoginPageCreds", x_wfSaveLoginPageCreds.arguments); }; function x_wfRemindPassword() { sajax_do_call("wfRemindPassword", x_wfRemindPassword.arguments); }; function x_wfChangeAvailUsersPage() { sajax_do_call("wfChangeAvailUsersPage", x_wfChangeAvailUsersPage.arguments); }; window.onbeforeunload = checkForChanges; function checkForChanges() { if (saveFlag && !doCheckChanges(cur_editor)) { return "You have made changes to the content without saving your changes. Are you sure you want to exit this page?"; } } var aLt = new Array();aLt["attach-no-description"] = 'No description'; aLt["cancel"] = 'Cancel'; aLt["comment-delete"] = 'Are you sure you want to delete this comment?'; aLt["gallery-close"] = 'close'; aLt["gallery-next"] = 'next'; aLt["gallery-prev"] = 'prev'; aLt["internal-error"] = 'Sorry, but there was an internal problem - please try again soon.'; aLt["js-label_cancel"] = 'Cancel'; aLt["js-label_save"] = 'Save'; aLt["js-tooltip_cancel"] = 'Exit Without Saving Changes'; aLt["js-tooltip_save"] = 'Save and Exit (Alt+S)'; aLt["ldap-provide-credentials"] = 'Please provide external service login credentials.'; aLt["loading"] = 'Loading...'; aLt["menu-confirm-delete"] = 'Are you sure you want to delete this file?'; aLt["menu-delete-file"] = 'Delete'; aLt["menu-edit-description"] = 'Edit description'; aLt["menu-move-file"] = 'Move'; aLt["menu-previous-versions"] = 'Previous versions'; aLt["menu-view-original"] = 'View original'; aLt["print-end-notes"] = 'Endnotes'; aLt["ready"] = 'Ready'; aLt["submit"] = 'Submit'; aLt["select-files"] = 'Select files...'; aLt["wikibits-attach-another"] = 'Attach another file'; aLt["wikibits-attach-file"] = 'Attach File'; aLt["wikibits-cant-attach-editing"] = 'Sorry, you can\'t attach files while editing a page. Please close the editor first.'; aLt["wikibits-edit-section"] = 'Edit section'; aLt["wikibits-remove-file"] = 'Remove file'; var wfMsg = function (key) { return aLt[key] ? aLt[key] : 'MISSING: ' + key; };var navMaxWidth = 1600; //hook in menu clicking events to the document's body YAHOO.util.Event.addListener(document, "click", function () { FileMenu.bodyClick(); DWMenu.BodyClick(); }); YAHOO.util.Event.onDOMReady(function () { new clientWindow }); YAHOO.util.Event.onAvailable("siteNavTree", wik.nav.init, wik.nav, true); YAHOO.util.Event.onDOMReady(function() { tb_init('a.lightbox, area.lightbox, input.lightbox, a[@rel=awesomebox]');//pass where to apply thickbox imgLoader = new Image();// preload image imgLoader.src = tb_pathToImage; }); YAHOO.util.Event.onDOMReady(function() { MTComments.HookBehavior(); }); </script> <!-- styles overwritten via control panel - load this css last --> </head> <body class=" en-us"> <noscript>This application requires Javascript to be enabled.</noscript> <div class="global"> <div class="globalWrap"> <div class="header"> <div class="mastPre"></div> <div class="mast"> <div class="siteLogo"> <a href="" title="Federal Data Web 2.0 Wiki Pilot"><img src="skins/fiesta/sky-tangerine/logo.png" alt="Federal Data Web 2.0 Wiki Pilot" title="Federal Data Web 2.0 Wiki Pilot"/></a> </div> </div> <div class="mastPost"></div> <div class="siteNavPre"></div> <div class="siteNav"> <div class="userAuthPre"></div> <div class="userAuth"> <span>Logged in:</span> <span>Logged in as:</span> <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3" class="userLogin">Log in</a> </div> <div class="userAuthPost"></div> <div class="custom custom2"> </div> <div class="navPre"></div> <div id="siteNavTree"><div class="node dockedNode homeNode lastDocked parentClosed" id="n21" c="n2348,n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n46,n842,n498,n418,n75,n73,n654,n1883,n534,n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757" path=""><a href="" title="Federal Data Web 2.0 Wiki Pilot"><span>Federal Data Web 2....</span></a></div><div class="node childNode sibling" id="n2348" p="n21" path="Analytics/"><a href="Analytics" title="Analytics"><span>Analytics</span></a></div><div class="node childNode sibling selected" id="n710" p="n21" path="Blackbook_2_and_3/"><a href="Blackbook_2_and_3" title="Blackbook 2 and 3"><span>Blackbook 2 and 3</span></a></div><div class="node childNode sibling" id="n70" p="n21" path="Blog_(Web_Log)/"><a href="Blog_(Web_Log)" title="Blog (Web Log)"><span>Blog (Web Log)</span></a></div><div class="node childNode sibling" id="n542" p="n21" path="Cambridge_Semantics_Recovery.gov/"><a href="Cambridge_Semantics_Recovery.gov" title="Cambridge Semantics Recovery.gov"><span>Cambridge Semantic...</span></a></div><div class="node childNode sibling" id="n497" p="n21" path="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive/"><a href="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive" title="Comments and Innovations for the Open Government and Transparency Directive"><span>Comments and Innov...</span></a></div><div class="node childNode sibling" id="n1144" p="n21" path="Data.gov/"><a href="Data.gov" title="Data.gov Adds Geoviewer"><span>Data.gov Adds Geovi...</span></a></div><div class="node childNode sibling" id="n702" p="n21" path="Data.gov_Concept_of_Operations_v0.7/"><a href="Data.gov_Concept_of_Operations_v0.7" title="Data.gov Concept of Operations"><span>Data.gov Concept of...</span></a></div><div class="node childNode sibling" id="n2349" p="n21" path="Data.gov_CONOPS/"><a href="Data.gov_CONOPS" title="Data.gov CONOPS"><span>Data.gov CONOPS</span></a></div><div class="node childNode sibling" id="n1437" p="n21" path="Data.gov%2fsemantic/"><a href="Data.gov%2f%2fsemantic" title="Data.gov/semantic"><span>Data.gov/semantic</span></a></div><div class="node childNode sibling parentClosed" id="n2346" p="n21" path="Data_Science/" cd="0"><a href="Data_Science" title="Data Science"><span>Data Science</span></a></div><div class="node childNode sibling" id="n990" p="n21" path="Executive_Office_of_the_President_-_OMB_and_NSA_Detail/"><a href="Executive_Office_of_the_President_-_OMB_and_NSA_Detail" title="Executive Office of the President - OMB and NSA Detail for Data.gov"><span>Executive Office of ...</span></a></div><div class="node childNode sibling parentClosed" id="n35" p="n21" path="Federal_Data_Architecture_Subcommittee_(DAS)/" cd="0"><a href="Federal_Data_Architecture_Subcommittee_(DAS)" title="Federal Data Architecture Subcommittee (DAS)"><span>Federal Data Archite...</span></a></div><div class="node childNode sibling" id="n33" p="n21" path="Federal_Data_Reference_Model/"><a href="Federal_Data_Reference_Model" title="Federal Data Reference Model"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n34" p="n21" path="Federal_Data_Reference_Model_2.0/" cd="0"><a href="Federal_Data_Reference_Model_2.0" title="Federal Data Reference Model 2.0"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed" id="n526" p="n21" path="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form/" cd="0"><a href="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form" title="Federal Enterprise Architecture Reference Model Revision Submission Form (DRM 3.0)"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling parentClosed" id="n543" p="n21" path="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0/" cd="0"><a href="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0" title="Federal Enterprise Architecture Security and Privacy Profile Version 3.0"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling" id="n1884" p="n21" path="Federal_IT_Dashboard/"><a href="Federal_IT_Dashboard" title="Federal IT Dashboard"><span>Federal IT Dashboar...</span></a></div><div class="node childNode sibling parentClosed" id="n46" p="n21" path="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)/" cd="0"><a href="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)" title="Federal Semantic Interoperability Community of Practice (SICoP)"><span>Federal Semantic Int...</span></a></div><div class="node childNode sibling" id="n842" p="n21" path="FGDC_Standards_WG_meeting_-_February_23,_2010/"><a href="FGDC_Standards_WG_meeting_-_February_23%2c_2010" title="FGDC Standards WG Meeting - February 23, 2010"><span>FGDC Standards WG ...</span></a></div><div class="node childNode sibling" id="n498" p="n21" path="George_Thomas_on_Recovery.gov/"><a href="George_Thomas_on_Recovery.gov" title="George Thomas on Recovery.gov"><span>George Thomas on R...</span></a></div><div class="node childNode sibling parentClosed" id="n418" p="n21" path="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society/" cd="0"><a href="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society" title="Harnessing the Power of Digital Data for Science and Society"><span>Harnessing the Powe...</span></a></div><div class="node childNode sibling" id="n75" p="n21" path="Interagency_Forum_on_Data_Preservation,_Stewardship,_and_LifeCycle_ESIP_Federation_Meeting,_January_8,_2009/"><a href="Interagency_Forum_on_Data_Preservation%2c_Stewardship%2c_and_LifeCycle_ESIP_Federation_Meeting%2c_January_8%2c_2009" title="Interagency Forum on Data Preservation, Stewardship, and LifeCycle ESIP Federation Meeting, January 8, 2009"><span>Interagency Forum o...</span></a></div><div class="node childNode sibling parentClosed" id="n73" p="n21" path="Interagency_Working_Group_on_Digitial_Data/" cd="0"><a href="Interagency_Working_Group_on_Digitial_Data" title="Interagency Working Group on Digitial Data"><span>Interagency Working...</span></a></div><div class="node childNode sibling" id="n654" p="n21" path="June_4,_2009_How_Does_Government_Become_an_Open_Platform?/"><a href="June_4%2c_2009_How_Does_Government_Become_an_Open_Platform%3f" title="June 4, 2009 How Does Government Become an Open Platform?"><span>June 4, 2009 How Do...</span></a></div><div class="node childNode sibling" id="n1883" p="n21" path="Labor's_Enforcement_Data_Catalog/"><a href="Labor's_Enforcement_Data_Catalog" title="Labor's Enforcement Data Catalog"><span>Labor's Enforcement...</span></a></div><div class="node childNode sibling moreNodes" id="n534" p="n21" path="May_13,_2009_Semantic_Web_Meetup/" content="May 13, 2009 Seman..." contentTitle="May 13, 2009 Semantic Web Meetup" hiddenNodes="n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757"><a href="May_13%2c_2009_Semantic_Web_Meetup" title="More..."><span class="more">...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2368" p="n21" path="Model_for_Performance-Driven_Government/" cd="0"><a href="Model_for_Performance-Driven_Government" title="Model for Performance-Driven Government"><span>Model for Performan...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n704" p="n21" path="NIEM/"><a href="NIEM" title="NIEM"><span>NIEM</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n661" p="n21" path="Open_Group_Enterprise_Vocabularly_Workshop_June_3,_2009/"><a href="Open_Group_Enterprise_Vocabularly_Workshop_June_3%2c_2009" title="Open Group Enterprise Vocabularly Workshop June 3, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n653" p="n21" path="Open_Group_Enterprise_Vocabulary_Workshop_May_20,_2009/"><a href="Open_Group_Enterprise_Vocabulary_Workshop_May_20%2c_2009" title="Open Group Enterprise Vocabulary Workshop May 20, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n711" p="n21" path="Page_Title/"><a href="Page_Title" title="Open Government Directive Workshop, January 11, 2010"><span>Open Government Di...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1473" p="n21" path="Scientific_Data_Management_for_Government_Agencies/"><a href="Scientific_Data_Management_for_Government_Agencies" title="Scientific Data Management for Government Agencies"><span>Scientific Data Mana...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2352" p="n21" path="Semantic_eScience/" cd="0"><a href="Semantic_eScience" title="Semantic eScience"><span>Semantic eScience</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n427" p="n21" path="Statistical_Abstract_of_the_United_States:_2009/" cd="0"><a href="Statistical_Abstract_of_the_United_States%3a_2009" title="Statistical Abstract of the United States: 2009"><span>Statistical Abstract ...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1140" p="n21" path="Statistics/" cd="0"><a href="Statistics" title="Statistics"><span>Statistics</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2287" p="n21" path="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010/" cd="0"><a href="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010" title="Survey of EPA and Other Federal Agency Scientific Data Management Policies and Guidance 2010"><span>Survey of EPA and O...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n581" p="n21" path="The_Recovery_Dialogue_on_IT_Solutions/" cd="0"><a href="The_Recovery_Dialogue_on_IT_Solutions" title="The Recovery Dialogue on IT Solutions"><span>The Recovery Dialog...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n695" p="n21" path="Tools_for_linked_data_from_DERI/"><a href="Tools_for_linked_data_from_DERI" title="Tools for linked data from DERI"><span>Tools for linked dat...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1935" p="n21" path="Top_Secret_America/"><a href="Top_Secret_America" title="Top Secret America"><span>Top Secret America</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n1134" p="n21" path="Ucore-SL/" cd="0"><a href="Ucore-SL" title="Ucore-SL"><span>Ucore-SL</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n500" p="n21" path="W3C_eGovernment_Interest_Group/" cd="0"><a href="W3C_eGovernment_Interest_Group" title="W3C eGovernment Interest Group"><span>W3C eGovernment In...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n2359" p="n21" path="Watershed_Boundary_Dataset/"><a href="Watershed_Boundary_Dataset" title="Watershed Boundary Dataset"><span>Watershed Boundary ...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1757" p="n21" path="White_House_Salaries/"><a href="White_House_Salaries" title="White House Salaries"><span>White House Salarie...</span></a></div></div> <div class="navPost"></div> <div class="custom"> </div> </div> <div class="siteNavPost"></div> </div> <div class="body"> <div class="bodyHeader"> <div class="pre"></div> <div class="post"></div> </div> <div class="page"> <!-- required print options --> <div class="custom custom1"> </div> <div class="siteNav"> <div class="pre"></div> <div class="siteSearch"> <fieldset class="search"> <form action="Special:Search"> <span>Search: </span><input id="searchInput" class="inputText" name="search" type="text" value="" /> <input type="hidden" name="type" value="fulltext" /> <input type="submit" name="go" class="inputSubmit" value="Find" /> </form> </fieldset> </div> <ul> <li class="userPage"><a href="User:Anonymous"><span></span>My Page</a></li> <li class="siteChanges"><a href="Special:Recentchanges"><span></span>Recent changes</a></li> <li class="siteTools"><a href="#" onclick="return DWMenu.Position('menuTools', this, 0, 0);"><span></span>Tools</a></li> <li class="siteHelp"><a href="Resources/Documentation/FAQ/MindTouch_Express"><span></span>Help</a></li> <li class="siteHelp"><a href="pro/"><span></span>Go Pro</a></li> </ul> <div class="post"></div> </div> <div class="pageBar"> <div class="pre"></div> <div class="pageRevision"> <!-- last modified --> Page last modified <a href="index.php?title=Blackbook_2_and_3&amp;action=history" title="20:27, 15 Feb 2010">20:27, 15 Feb 2010</a> by <a href="User:LucasGraim" class="link-user" rel="internal">LucasGraim</a> <!-- end last modified --> </div> <div class="pageNav"> <ul> <li class="pageEdit"><a href="#" title="Edit page" onclick="return false" class="disabled"><span></span>Edit page</a></li> <li class="pageAdd"><a href="#" title="New page" class="disabled"><span></span>New page</a></li> <li class="pageRestrict"><a href="#" title="Restrict access" onclick="return false" class="disabled"><span></span>Restrict access</a></li> <li class="pageAttach"><a href="#" title="Attach file" onclick="return false" class="disabled"><span></span>Attach file</a></li> <li class="pageMove"><a href="#" title="Move page" onclick="return false" class="disabled"><span></span>Move page</a></li> <li class="pageDelete"><a href="#" title="Delete page" onclick="return false" class="disabled"><span></span>Delete page</a></li> <li class="pagePrint"><a href="index.php?title=Blackbook_2_and_3&amp;action=print" title="Print page" onclick="return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" class=""><span></span>Print page</a></li> <li class="pageMore"><a href="#" onclick="return DWMenu.Position('menuPageOptions', this, 0, 0);"><span></span>More</a></li> <li class="navSplit"></li> <li class="pageToc"><a href="#" title="Table of contents" onclick="return DWMenu.Position('menuPageContent', this, -2, 0)" class="disabled"><span></span>Table of contents</a></li> </ul> </div> <div class="post"></div> </div> <div class="pageContentFrame"> <div class="custom custom4"> </div> <div id="pageContent" class="pageContent"> <div class="hierarchy"> <span class="dw-hierarchy"><a href="">Federal Data Web 2.0 Wiki Pilot</a> &gt; Blackbook 2 and 3</span> </div> <div class="pageTitle"> <h1 id="title"><span class="pageRestricted" >Blackbook 2 and 3</span></h1> </div> <div class="pageStatus"> </div> <div class="PageDW-Blackbook2and3"> <div id="page-top"><div id="pageToc"><div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div><div class="pageText" id="pageText"> <p>NSA&rsquo;s Blackbook 2 and 3 - The Standard in Semantic Web Technology for Data Management:</p> <p>Blackbook2 is a project architected by Intervise&rsquo;s Chief Technology Officer (Scott Streit), which moved into open source on September 1, 2009. Blackbook2 is a standard for semantic web processing and is currently used, in production or pilots, at the Department of Defense, Dole Foods, and the Environmental Protection Agency, just to name a few. Without changing Blackbook2, merely adding new data, Blackbook2 processes anything from Shipping Visibility Data to classified, analytical processing.</p> <p>For <a class=" external" rel="external nofollow" target="_blank" href="" title="http://www.resumesplanet.com"> resume writers</a>, web application framework for data analysis, Blackbook2's architecture provides secure support for visualization, transformation, data source integration, asynchronous operations, and is vocabulary agnostic. Application programming interfaces (APIs) exist for plugin components that visualize, discover, transform, extract, enrich, or filter graph&#8208;based data such as social networks. Data sources of many types (RDBMs, Documents, RSS) can be mapped into Blackbook2 as RDF/OWL, either by Ingest or real-time mapping solutions such as D2RQ.</p> <p>The Blackbook2 architecture provides asynchronous operations via a message bus backend so that results are provided just-in-time to real&#8208;time users or to workflows that may run for hours. Blackbook2 is vocabulary agnostic: it can provide mapping to a common ontology for all data sources or it can accommodate disparate vocabularies with common vocabulary subsets (e.g., Dublin Core, VCard). Finally, Blackbook2 is accredited for multi-level security via role-based access and provides integrated logging via standard interfaces (JAAS and Log4J).</p> <p>Blackbook 2, and now 3, is available free to Federal government employees and is currently running on the NSA CloudBase Cloud Computing Platform. Software, documentation, and collaboration are available at <a class="external" rel="external nofollow" target="_blank" href="wiki/index.php/Main_Page" title="http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page">http://rabasrv.jhuapl.edu/wiki/index.php/Main_Page</a>&nbsp; by contacting Buster Fields at <a class="link-mailto" rel="external nofollow" target="_blank" href="mailto:hlfield@nsa.gov" title="mailto:hlfield@nsa.gov">hlfield@nsa.gov</a> .</p></div></div><div class="printfooter" id="printfooter"><hr /> <p>Retrieved from "<a href="Blackbook_2_and_3">http://federaldata.Wik.is/Blackbook_2_and_3</a>"</p> </div> </div> </div> </div> <div class="DW-clear"></div> <div class="pageInfo"> <dl> <dt class="pageTags"><span></span>Tag page</dt> <dd class="pageTags"> <div id="pageTags"><div class="pageTagList"><div class="item taglist"></div></div></div> </dd> <dt class="pageIncomingLinks"><span></span>What links here</dt> <dd class="pageIncomingLinks"></dd> </dl> </div> <div class="file"> <h2>Files 0</h2> <div class="fileAdd"> <a href="Blackbook_2_and_3" class="disabled" onclick="return false"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="attach" alt="" /></span><span class="text">Attach file or image</span></a> </div> <div class="fileList"> <div id="pageFiles"><div class="nofiles">&nbsp;</div></div> </div> </div> <div class="gallery"> <h2>Images 0</h2> <div id="pageGalleryWrap"><div class="nofiles">&nbsp;</div></div> </div> <div id="comments"><div class="comments"><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div><div class="comment" id="comment179"><div class="commentNum"><a href="Blackbook_2_and_3#comment179">#179</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm179"></div><div class="commentContent" id="commentText179">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment177"><div class="commentNum"><a href="Blackbook_2_and_3#comment177">#177</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm177"></div><div class="commentContent" id="commentText177">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment176"><div class="commentNum"><a href="Blackbook_2_and_3#comment176">#176</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm176"></div><div class="commentContent" id="commentText176">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment184"><div class="commentNum"><a href="Blackbook_2_and_3#comment184">#184</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm184"></div><div class="commentContent" id="commentText184">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment183"><div class="commentNum"><a href="Blackbook_2_and_3#comment183">#183</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm183"></div><div class="commentContent" id="commentText183">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment182"><div class="commentNum"><a href="Blackbook_2_and_3#comment182">#182</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm182"></div><div class="commentContent" id="commentText182">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment181"><div class="commentNum"><a href="Blackbook_2_and_3#comment181">#181</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm181"></div><div class="commentContent" id="commentText181">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment186"><div class="commentNum"><a href="Blackbook_2_and_3#comment186">#186</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm186"></div><div class="commentContent" id="commentText186">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment185"><div class="commentNum"><a href="Blackbook_2_and_3#comment185">#185</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm185"></div><div class="commentContent" id="commentText185">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment192"><div class="commentNum"><a href="Blackbook_2_and_3#comment192">#192</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm192"></div><div class="commentContent" id="commentText192">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment191"><div class="commentNum"><a href="Blackbook_2_and_3#comment191">#191</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm191"></div><div class="commentContent" id="commentText191">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment190"><div class="commentNum"><a href="Blackbook_2_and_3#comment190">#190</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm190"></div><div class="commentContent" id="commentText190">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment189"><div class="commentNum"><a href="Blackbook_2_and_3#comment189">#189</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm189"></div><div class="commentContent" id="commentText189">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment188"><div class="commentNum"><a href="Blackbook_2_and_3#comment188">#188</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm188"></div><div class="commentContent" id="commentText188">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment187"><div class="commentNum"><a href="Blackbook_2_and_3#comment187">#187</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ThanksMuch" class="link-user" rel="internal">ThanksMuch</a> says:</span></div><div id="commentTextForm187"></div><div class="commentContent" id="commentText187">.<div class="commentPosted">Posted 15:34, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="commentMore">Viewing 15 of 143 comments: <a href="index.php?title=Blackbook_2_and_3&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div></div><div class="commentForm">You must <a href="index.php?title=Special:Userlogin&amp;returntotitle=Blackbook+2+and+3">login</a> to post a comment.</div></div> <div class="custom custom5"> </div> </div> <div class="bodyFooter"> <div class="pre"></div> <div class="post"></div> </div> <div class="Wik.is"><div class="poweredBy">Powered by <a href=""> Wik.is Express: open source enterprise collaboration and wik software</a></div></div> <div class="sourceforge" style="text-align: center; margin: 8px 0;"><a href="http://wik.is/"><img src="http://wik.is/wp-content/uploads/2015/06/logo1.png" alt=" Wik.is" /></a></div> </div> </div> </div> <script type="text/javascript">var _endtime = new Date().getTime(); var _size = 40215;</script> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuTools" style="display:none;"> <ul> <li class="siteListRss"><a href="Special:ListRss" title="RSS feeds"><span></span>RSS feeds</a></li> <li class="siteListusers"><a href="User:" title="Users"><span></span>Users</a></li> <li class="siteListTemplates"><a href="Template:" title="Templates"><span></span>Templates</a></li> <li class="siteSitemap"><a href="Special:Sitemap" title="Sitemap"><span></span>Sitemap</a></li> <li class="sitePopularpages"><a href="Special:Popularpages" title="Popular pages"><span></span>Popular pages</a></li> <li class="siteAbout"><a href="Special:About" title="About"><span></span>About</a></li> </ul> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageOptions" style="display:none;"> <ul> <li class="pageEdit disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Edit page"><span></span>Edit page</a></li> <li class="pageAdd disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');" title="New page"><span></span>New page</a></li> <li class="pageRestrict disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Restrict access"><span></span>Restrict access</a></li> <li class="pageAttach disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Attach file"><span></span>Attach file</a></li> <li class="pageMove disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Move page"><span></span>Move page</a></li> <li class="pageDelete disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Delete page"><span></span>Delete page</a></li> <li class="pagePrint "><a href="index.php?title=Blackbook_2_and_3&amp;action=print" onclick="menuOff('menuPageOptions');return Print.open('/index.php?title=Blackbook_2_and_3&amp;action=print');" title="Print page"><span></span>Print page</a></li> <li class="pageTags disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Tag"><span></span>Tag</a></li> <li class="pageEmail disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Email link"><span></span>Email link</a></li> <li class="pageProperties disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Set page properties"><span></span>Set page properties</a></li> <li class="pageTalk "><a href="Talk:Blackbook_2_and_3" onclick="menuOff('menuPageOptions');" title="Talk page"><span></span>Talk page</a></li> <li class="pageWatch "><a href="index.php?title=Blackbook_2_and_3&amp;action=watch" onclick="menuOff('menuPageOptions');" title="Watch page"><span></span>Watch page</a></li> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuBacklink" style="display:none;"> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageContent" style="display:none;"> <div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div> <div class="ui-msg-wrap" id="MTMessage" style="display: none;"> <div class="ui-msg ui-errormsg" id="MTMessageStyle"> <div class="ui-msg-opt"> <ul> <li><a href="#" class="dismiss" onclick="return MTMessage.Hide();">dismiss message</a></li> <li><a href="#" class="details" id="MTMessageDetailsLink" onclick="return MTMessage.ShowDetails(this);">view details</a></li> </ul> <div class="ui-msg-autoclose"> <span id="MTMessageUnpaused" style="display: inline;">Message will close by itself in <span id="MTMessageTimer"></span> seconds</span> <span id="MTMessagePaused" style="display: none;">Message timer has been stopped</span> </div> </div> <div class="ui-msg-header" id="MTMessageHeader"></div> <div class="ui-msg-desc" id="MTMessageDesc"></div> <div class="ui-msg-desc" id="MTMessageDetails" style="display: none;"> <p>Viewing Details:</p> </div> </div> </div><div id="menuFiller"></div><div id="bodyHeight"></div><script src="urchin.js" type="text/javascript"></script> <!-- Served by ec2-75-101-202-187.compute-1.amazonaws.com in 1.69 secs. --> <!-- /wik/site/settings: 0.75441813468933--> <!-- /wik/users/=Anonymous: 0.043669939041138--> <!-- /wik/site/services/1: 0.0053939819335938--> <!-- /wik/pages/710/contents: 0.022506952285767--> <!-- /wik/pages/710: 0.061690092086792--> <!-- /wik/pages/710/comments: 0.6609480381012--> <!-- /wik/pages/710/security: 0.019191026687622--> <!-- /wik/site/nav/=Blackbook%2B2%2Band%2B3/full: 0.051814079284668--> <!-- Total: 1.6196322441101--> <!-- Real: 1.6196322441101--> </body> </html> 5b468296ab961ef7a839aa679d29fe37445abcaa ToolsforlinkedData 0 174 395 2016-01-13T17:25:38Z Eddie 1 Created page with "<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="..." wikitext text/x-wiki <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us" dir=""> <head> <script type="text/javascript">var _starttime = new Date().getTime();</script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="robots" content="index,follow" /> <link rel="shortcut icon" href="favicon.ico" /> <meta name="generator" content=" Wik.is" /> <link rel="search" type="application/opensearchdescription+xml" title="Federal Data Web 2.0 Wiki Pilot Search" href="/@gui/opensearch/description" /> <title>Tools for linked data from DERI - Federal Data Web 2.0 Wiki Pilot</title> <!-- default css --> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/_reset.css"/> <link rel="stylesheet" type="text/css" media="screen" href="skins/common/css.php" /> <!--[if IE 7]><style type="text/css">@import "/skins/common/_ie7.css";</style><![endif]--><!--[if IE 6]><style type="text/css">@import "/skins/common/_ie.css";</style><![endif]--> <link rel="stylesheet" type="text/css" media="print" href="skins/common/print.css" /> <!-- default scripting --> <script type="text/javascript" src="skins/common/js.php?perms=LOGIN,BROWSE,READ,SUBSCRIBE&amp;lang=en-us"></script> <!-- specific screen stylesheets--> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/sky-tangerine/css.php"/> <!-- specific print stylesheets --> <link rel="stylesheet" type="text/css" media="print" href="skins/fiesta/print.css" /> <!-- IE6 & IE7 specific stuff --> <!--[if IE]><meta http-equiv="imagetoolbar" content="no" /><![endif]--> <!--[if IE 6]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie6.php"/><![endif]--> <!--[if IE 7]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie7.php"/><![endif]--> <script type="text/javascript"> _page_redirect = false; _path_tpl = '/skins/fiesta'; _path_skin = '/skins/fiesta/sky-tangerine'; _path_common = '/skins/common'; _path_icons = '/skins/common/icons'; editToken = 'aa3a21a0d6b7aa203b0560f8ecf41eb5'; _userName = 'Anonymous'; _userId = '2'; var _editor_styles_path = ['/skins/fiesta/_editor.css', '/skins/fiesta/sky-tangerine/_content.css', '']; _today = '3 Oct 2010'; baseHref = '/web/20101004055757/http://federaldata.Wik.is'; _page_titlePath = '/'; _page_titleName = 'Tools for linked data from DERI'; _page_ID = 695; _total_images = 6; contextTopic = 'Tools for linked data from DERI'; _over_storage_quota = false; saveFlag = false; // remote scripting library // (c) copyright 2005 modernmethod, inc var sajax_debug_mode = false; var sajax_request_type = "POST"; function sajax_debug(text) { if (sajax_debug_mode) alert("RSD: " + text); }; function sajax_init_object() { sajax_debug("sajax_init_object() called.."); var A = window.XMLHttpRequest ? new XMLHttpRequest() : window.ActiveXObject ? new ActiveXObject("Microsoft.XMLHTTP") : null; if (!A) sajax_debug("Could not create connection object."); return A; }; function _sajax_do_call(x, func_name, args) { var i, x, n; var uri; var post_data; uri = "/index.php"; if (sajax_request_type == "GET") { if (uri.indexOf("?") == -1) uri = uri + "?rs=" + encodeURIComponent(func_name); else uri = uri + "&rs=" + encodeURIComponent(func_name); for (i = 0; i < args.length-1; i++) { var a = args[i]; uri = uri + "&rsargs[]=" + encodeURIComponent(a); } uri = uri + "&rsrnd=" + new Date().getTime(); post_data = null; } else { post_data = "rs=" + func_name; for (i = 0; i < args.length-1; i++) { var a = args[i]; post_data = post_data + "&rsargs[]=" + encodeURIComponent(a); } } x.open(sajax_request_type, uri, true); if (sajax_request_type == "POST") { x.setRequestHeader("Method", "POST " + uri + " HTTP/1.1"); x.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); } x.onreadystatechange = function() { if (x.readyState != 4) return; if (typeof sajax_debug != 'undefined') sajax_debug("received " + x.responseText); var status; var data = x.responseText.replace(/^\s+/, ''); status = data.charAt(0); data = data.substring(2); if (status == "-") alert("Error: " + data); else args[args.length-1](data); } x.send(post_data); sajax_debug(func_name + " uri = " + uri + "/post = " + post_data); sajax_debug(func_name + " waiting.."); return x; }; function sajax_do_call(func_name, args) { x = sajax_init_object(); _sajax_do_call(x, func_name, args); delete x; }; function x_breadcrumbSet() { sajax_do_call("breadcrumbSet", x_breadcrumbSet.arguments); }; function x_wfAdminUserForm() { sajax_do_call("wfAdminUserForm", x_wfAdminUserForm.arguments); }; function x_wfSetUserOption() { sajax_do_call("wfSetUserOption", x_wfSetUserOption.arguments); }; function x_wfSetRestrictions() { sajax_do_call("wfSetRestrictions", x_wfSetRestrictions.arguments); }; function x_setUserOption() { sajax_do_call("setUserOption", x_setUserOption.arguments); }; function x_wfValidateUserOrGroup() { sajax_do_call("wfValidateUserOrGroup", x_wfValidateUserOrGroup.arguments); }; function x_wfSaveEdit() { sajax_do_call("wfSaveEdit", x_wfSaveEdit.arguments); }; function x_wfQueryLinks() { sajax_do_call("wfQueryLinks", x_wfQueryLinks.arguments); }; function x_loadInplaceEditor() { sajax_do_call("loadInplaceEditor", x_loadInplaceEditor.arguments); }; function x_doSetbaseHref() { sajax_do_call("doSetbaseHref", x_doSetbaseHref.arguments); }; function x_showFileAttachments() { sajax_do_call("showFileAttachments", x_showFileAttachments.arguments); }; function x_doSectionEdit() { sajax_do_call("doSectionEdit", x_doSectionEdit.arguments); }; function x_postComment() { sajax_do_call("postComment", x_postComment.arguments); }; function x_getComments() { sajax_do_call("getComments", x_getComments.arguments); }; function x_deleteComment() { sajax_do_call("deleteComment", x_deleteComment.arguments); }; function x_editComment() { sajax_do_call("editComment", x_editComment.arguments); }; function x_wfEmailPage() { sajax_do_call("wfEmailPage", x_wfEmailPage.arguments); }; function x_wfCheckNewTitle() { sajax_do_call("wfCheckNewTitle", x_wfCheckNewTitle.arguments); }; function x_wfDeleteFile() { sajax_do_call("wfDeleteFile", x_wfDeleteFile.arguments); }; function x_wfSetPageProperties() { sajax_do_call("wfSetPageProperties", x_wfSetPageProperties.arguments); }; function x_wfDeleteTopic() { sajax_do_call("wfDeleteTopic", x_wfDeleteTopic.arguments); }; function x_wfRenameTopic() { sajax_do_call("wfRenameTopic", x_wfRenameTopic.arguments); }; function x_wfMoveAttachments() { sajax_do_call("wfMoveAttachments", x_wfMoveAttachments.arguments); }; function x_wfGetAttachmentUrl() { sajax_do_call("wfGetAttachmentUrl", x_wfGetAttachmentUrl.arguments); }; function x_wfInlineImageGallery() { sajax_do_call("wfInlineImageGallery", x_wfInlineImageGallery.arguments); }; function x_wfSetFileDescription() { sajax_do_call("wfSetFileDescription", x_wfSetFileDescription.arguments); }; function x_wfChangeLoginView() { sajax_do_call("wfChangeLoginView", x_wfChangeLoginView.arguments); }; function x_wfChangeLoginViewToCreate() { sajax_do_call("wfChangeLoginViewToCreate", x_wfChangeLoginViewToCreate.arguments); }; function x_wfSaveCredsToSession() { sajax_do_call("wfSaveCredsToSession", x_wfSaveCredsToSession.arguments); }; function x_wfChangeAddServiceView() { sajax_do_call("wfChangeAddServiceView", x_wfChangeAddServiceView.arguments); }; function x_wfSaveLoginPageCreds() { sajax_do_call("wfSaveLoginPageCreds", x_wfSaveLoginPageCreds.arguments); }; function x_wfRemindPassword() { sajax_do_call("wfRemindPassword", x_wfRemindPassword.arguments); }; function x_wfChangeAvailUsersPage() { sajax_do_call("wfChangeAvailUsersPage", x_wfChangeAvailUsersPage.arguments); }; window.onbeforeunload = checkForChanges; function checkForChanges() { if (saveFlag && !doCheckChanges(cur_editor)) { return "You have made changes to the content without saving your changes. Are you sure you want to exit this page?"; } } var aLt = new Array();aLt["attach-no-description"] = 'No description'; aLt["cancel"] = 'Cancel'; aLt["comment-delete"] = 'Are you sure you want to delete this comment?'; aLt["gallery-close"] = 'close'; aLt["gallery-next"] = 'next'; aLt["gallery-prev"] = 'prev'; aLt["internal-error"] = 'Sorry, but there was an internal problem - please try again soon.'; aLt["js-label_cancel"] = 'Cancel'; aLt["js-label_save"] = 'Save'; aLt["js-tooltip_cancel"] = 'Exit Without Saving Changes'; aLt["js-tooltip_save"] = 'Save and Exit (Alt+S)'; aLt["ldap-provide-credentials"] = 'Please provide external service login credentials.'; aLt["loading"] = 'Loading...'; aLt["menu-confirm-delete"] = 'Are you sure you want to delete this file?'; aLt["menu-delete-file"] = 'Delete'; aLt["menu-edit-description"] = 'Edit description'; aLt["menu-move-file"] = 'Move'; aLt["menu-previous-versions"] = 'Previous versions'; aLt["menu-view-original"] = 'View original'; aLt["print-end-notes"] = 'Endnotes'; aLt["ready"] = 'Ready'; aLt["submit"] = 'Submit'; aLt["select-files"] = 'Select files...'; aLt["wikibits-attach-another"] = 'Attach another file'; aLt["wikibits-attach-file"] = 'Attach File'; aLt["wikibits-cant-attach-editing"] = 'Sorry, you can\'t attach files while editing a page. Please close the editor first.'; aLt["wikibits-edit-section"] = 'Edit section'; aLt["wikibits-remove-file"] = 'Remove file'; var wfMsg = function (key) { return aLt[key] ? aLt[key] : 'MISSING: ' + key; };var navMaxWidth = 1600; //hook in menu clicking events to the document's body YAHOO.util.Event.addListener(document, "click", function () { FileMenu.bodyClick(); DWMenu.BodyClick(); }); YAHOO.util.Event.onDOMReady(function () { new clientWindow }); YAHOO.util.Event.onAvailable("siteNavTree", wik.nav.init, wik.nav, true); YAHOO.util.Event.onDOMReady(function() { tb_init('a.lightbox, area.lightbox, input.lightbox, a[@rel=awesomebox]');//pass where to apply thickbox imgLoader = new Image();// preload image imgLoader.src = tb_pathToImage; }); YAHOO.util.Event.onDOMReady(function() { MTComments.HookBehavior(); }); </script> <!-- styles overwritten via control panel - load this css last --> </head> <body class=" en-us"> <noscript>This application requires Javascript to be enabled.</noscript> <div class="global"> <div class="globalWrap"> <div class="header"> <div class="mastPre"></div> <div class="mast"> <div class="siteLogo"> <a href="" title="Federal Data Web 2.0 Wiki Pilot"><img src="skins/fiesta/sky-tangerine/logo.png" alt="Federal Data Web 2.0 Wiki Pilot" title="Federal Data Web 2.0 Wiki Pilot"/></a> </div> </div> <div class="mastPost"></div> <div class="siteNavPre"></div> <div class="siteNav"> <div class="userAuthPre"></div> <div class="userAuth"> <span>Logged in:</span> <span>Logged in as:</span> <a href="index.php?title=Special:Userlogin&amp;returntotitle=Tools+for+linked+data+from+DERI" class="userLogin">Log in</a> </div> <div class="userAuthPost"></div> <div class="custom custom2"> </div> <div class="navPre"></div> <div id="siteNavTree"><div class="node dockedNode homeNode lastDocked parentClosed" id="n21" c="n2348,n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n2412,n46,n842,n498,n418,n75,n73,n654,n1883,n534,n2368,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n2359,n1757" path=""><a href="" title="Federal Data Web 2.0 Wiki Pilot"><span>Federal Data Web 2....</span></a></div><div class="node childNode sibling moreNodes" id="n2348" p="n21" path="Analytics/" content="Analytics" contentTitle="Analytics" hiddenNodes="n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n2412,n46"><a href="Analytics" title="More..."><span class="more">...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n710" p="n21" path="Blackbook_2_and_3/"><a href="Blackbook_2_and_3" title="Blackbook 2 and 3"><span>Blackbook 2 and 3</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n70" p="n21" path="Blog_(Web_Log)/"><a href="Blog_(Web_Log)" title="Blog (Web Log)"><span>Blog (Web Log)</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n542" p="n21" path="Cambridge_Semantics_Recovery.gov/"><a href="Cambridge_Semantics_Recovery.gov" title="Cambridge Semantics Recovery.gov"><span>Cambridge Semantic...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n497" p="n21" path="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive/"><a href="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive" title="Comments and Innovations for the Open Government and Transparency Directive"><span>Comments and Innov...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1144" p="n21" path="Data.gov/"><a href="Data.gov" title="Data.gov Adds Geoviewer"><span>Data.gov Adds Geovi...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n702" p="n21" path="Data.gov_Concept_of_Operations_v0.7/"><a href="Data.gov_Concept_of_Operations_v0.7" title="Data.gov Concept of Operations"><span>Data.gov Concept of...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n2349" p="n21" path="Data.gov_CONOPS/"><a href="Data.gov_CONOPS" title="Data.gov CONOPS"><span>Data.gov CONOPS</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1437" p="n21" path="Data.gov%2fsemantic/"><a href="Data.gov%2f%2fsemantic" title="Data.gov/semantic"><span>Data.gov/semantic</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2346" p="n21" path="Data_Science/" cd="0"><a href="Data_Science" title="Data Science"><span>Data Science</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n990" p="n21" path="Executive_Office_of_the_President_-_OMB_and_NSA_Detail/"><a href="Executive_Office_of_the_President_-_OMB_and_NSA_Detail" title="Executive Office of the President - OMB and NSA Detail for Data.gov"><span>Executive Office of ...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n35" p="n21" path="Federal_Data_Architecture_Subcommittee_(DAS)/" cd="0"><a href="Federal_Data_Architecture_Subcommittee_(DAS)" title="Federal Data Architecture Subcommittee (DAS)"><span>Federal Data Archite...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n33" p="n21" path="Federal_Data_Reference_Model/"><a href="Federal_Data_Reference_Model" title="Federal Data Reference Model"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n34" p="n21" path="Federal_Data_Reference_Model_2.0/" cd="0"><a href="Federal_Data_Reference_Model_2.0" title="Federal Data Reference Model 2.0"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n526" p="n21" path="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form/" cd="0"><a href="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form" title="Federal Enterprise Architecture Reference Model Revision Submission Form (DRM 3.0)"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n543" p="n21" path="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0/" cd="0"><a href="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0" title="Federal Enterprise Architecture Security and Privacy Profile Version 3.0"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1884" p="n21" path="Federal_IT_Dashboard/"><a href="Federal_IT_Dashboard" title="Federal IT Dashboard"><span>Federal IT Dashboar...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2412" p="n21" path="Federal_Segment_Architecture_Methodology_Toolkit/" cd="0"><a href="Federal_Segment_Architecture_Methodology_Toolkit" title="Federal Segment Architecture Methodology Toolkit"><span>Federal Segment Arc...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n46" p="n21" path="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)/" cd="0"><a href="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)" title="Federal Semantic Interoperability Community of Practice (SICoP)"><span>Federal Semantic Int...</span></a></div><div class="node childNode sibling" id="n842" p="n21" path="FGDC_Standards_WG_meeting_-_February_23,_2010/"><a href="FGDC_Standards_WG_meeting_-_February_23%2c_2010" title="FGDC Standards WG Meeting - February 23, 2010"><span>FGDC Standards WG ...</span></a></div><div class="node childNode sibling" id="n498" p="n21" path="George_Thomas_on_Recovery.gov/"><a href="George_Thomas_on_Recovery.gov" title="George Thomas on Recovery.gov"><span>George Thomas on R...</span></a></div><div class="node childNode sibling parentClosed" id="n418" p="n21" path="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society/" cd="0"><a href="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society" title="Harnessing the Power of Digital Data for Science and Society"><span>Harnessing the Powe...</span></a></div><div class="node childNode sibling" id="n75" p="n21" path="Interagency_Forum_on_Data_Preservation,_Stewardship,_and_LifeCycle_ESIP_Federation_Meeting,_January_8,_2009/"><a href="Interagency_Forum_on_Data_Preservation%2c_Stewardship%2c_and_LifeCycle_ESIP_Federation_Meeting%2c_January_8%2c_2009" title="Interagency Forum on Data Preservation, Stewardship, and LifeCycle ESIP Federation Meeting, January 8, 2009"><span>Interagency Forum o...</span></a></div><div class="node childNode sibling parentClosed" id="n73" p="n21" path="Interagency_Working_Group_on_Digitial_Data/" cd="0"><a href="Interagency_Working_Group_on_Digitial_Data" title="Interagency Working Group on Digitial Data"><span>Interagency Working...</span></a></div><div class="node childNode sibling" id="n654" p="n21" path="June_4,_2009_How_Does_Government_Become_an_Open_Platform?/"><a href="June_4%2c_2009_How_Does_Government_Become_an_Open_Platform%3f" title="June 4, 2009 How Does Government Become an Open Platform?"><span>June 4, 2009 How Do...</span></a></div><div class="node childNode sibling" id="n1883" p="n21" path="Labor's_Enforcement_Data_Catalog/"><a href="Labor's_Enforcement_Data_Catalog" title="Labor's Enforcement Data Catalog"><span>Labor's Enforcement...</span></a></div><div class="node childNode sibling" id="n534" p="n21" path="May_13,_2009_Semantic_Web_Meetup/"><a href="May_13%2c_2009_Semantic_Web_Meetup" title="May 13, 2009 Semantic Web Meetup"><span>May 13, 2009 Seman...</span></a></div><div class="node childNode sibling parentClosed" id="n2368" p="n21" path="Model_for_Performance-Driven_Government/" cd="0"><a href="Model_for_Performance-Driven_Government" title="Model for Performance-Driven Government"><span>Model for Performan...</span></a></div><div class="node childNode sibling" id="n704" p="n21" path="NIEM/"><a href="NIEM" title="NIEM"><span>NIEM</span></a></div><div class="node childNode sibling" id="n661" p="n21" path="Open_Group_Enterprise_Vocabularly_Workshop_June_3,_2009/"><a href="Open_Group_Enterprise_Vocabularly_Workshop_June_3%2c_2009" title="Open Group Enterprise Vocabularly Workshop June 3, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling" id="n653" p="n21" path="Open_Group_Enterprise_Vocabulary_Workshop_May_20,_2009/"><a href="Open_Group_Enterprise_Vocabulary_Workshop_May_20%2c_2009" title="Open Group Enterprise Vocabulary Workshop May 20, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling" id="n711" p="n21" path="Page_Title/"><a href="Page_Title" title="Open Government Directive Workshop, January 11, 2010"><span>Open Government Di...</span></a></div><div class="node childNode sibling" id="n1473" p="n21" path="Scientific_Data_Management_for_Government_Agencies/"><a href="Scientific_Data_Management_for_Government_Agencies" title="Scientific Data Management for Government Agencies"><span>Scientific Data Mana...</span></a></div><div class="node childNode sibling parentClosed" id="n2352" p="n21" path="Semantic_eScience/" cd="0"><a href="Semantic_eScience" title="Semantic eScience"><span>Semantic eScience</span></a></div><div class="node childNode sibling parentClosed" id="n427" p="n21" path="Statistical_Abstract_of_the_United_States:_2009/" cd="0"><a href="Statistical_Abstract_of_the_United_States%3a_2009" title="Statistical Abstract of the United States: 2009"><span>Statistical Abstract ...</span></a></div><div class="node childNode sibling parentClosed" id="n1140" p="n21" path="Statistics/" cd="0"><a href="Statistics" title="Statistics"><span>Statistics</span></a></div><div class="node childNode sibling parentClosed" id="n2287" p="n21" path="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010/" cd="0"><a href="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010" title="Survey of EPA and Other Federal Agency Scientific Data Management Policies and Guidance 2010"><span>Survey of EPA and O...</span></a></div><div class="node childNode sibling parentClosed" id="n581" p="n21" path="The_Recovery_Dialogue_on_IT_Solutions/" cd="0"><a href="The_Recovery_Dialogue_on_IT_Solutions" title="The Recovery Dialogue on IT Solutions"><span>The Recovery Dialog...</span></a></div><div class="node childNode sibling selected" id="n695" p="n21" path="Tools_for_linked_data_from_DERI/"><a href="Tools_for_linked_data_from_DERI" title="Tools for linked data from DERI"><span>Tools for linked dat...</span></a></div><div class="node childNode sibling" id="n1935" p="n21" path="Top_Secret_America/"><a href="Top_Secret_America" title="Top Secret America"><span>Top Secret America</span></a></div><div class="node childNode sibling parentClosed" id="n1134" p="n21" path="Ucore-SL/" cd="0"><a href="Ucore-SL" title="Ucore-SL"><span>Ucore-SL</span></a></div><div class="node childNode sibling parentClosed" id="n500" p="n21" path="W3C_eGovernment_Interest_Group/" cd="0"><a href="W3C_eGovernment_Interest_Group" title="W3C eGovernment Interest Group"><span>W3C eGovernment In...</span></a></div><div class="node childNode sibling" id="n2359" p="n21" path="Watershed_Boundary_Dataset/"><a href="Watershed_Boundary_Dataset" title="Watershed Boundary Dataset"><span>Watershed Boundary ...</span></a></div><div class="node childNode sibling" id="n1757" p="n21" path="White_House_Salaries/"><a href="White_House_Salaries" title="White House Salaries"><span>White House Salarie...</span></a></div></div> <div class="navPost"></div> <div class="custom"> </div> </div> <div class="siteNavPost"></div> </div> <div class="body"> <div class="bodyHeader"> <div class="pre"></div> <div class="post"></div> </div> <div class="page"> <!-- required print options --> <div class="custom custom1"> </div> <div class="siteNav"> <div class="pre"></div> <div class="siteSearch"> <fieldset class="search"> <form action="Special:Search"> <span>Search: </span><input id="searchInput" class="inputText" name="search" type="text" value="" /> <input type="hidden" name="type" value="fulltext" /> <input type="submit" name="go" class="inputSubmit" value="Find" /> </form> </fieldset> </div> <ul> <li class="userPage"><a href="User:Anonymous"><span></span>My Page</a></li> <li class="siteChanges"><a href="Special:Recentchanges"><span></span>Recent changes</a></li> <li class="siteTools"><a href="#" onclick="return DWMenu.Position('menuTools', this, 0, 0);"><span></span>Tools</a></li> <li class="siteHelp"><a href="Resources/Documentation/FAQ/MindTouch_Express"><span></span>Help</a></li> <li class="siteHelp"><a href="pro/"><span></span>Go Pro</a></li> </ul> <div class="post"></div> </div> <div class="pageBar"> <div class="pre"></div> <div class="pageRevision"> <!-- last modified --> Page last modified <a href="index.php?title=Tools_for_linked_data_from_DERI&amp;action=history" title="09:24, 10 Feb 2010">09:24, 10 Feb 2010</a> by <a href="User:Anry" class="link-user" rel="internal">Anry</a> <!-- end last modified --> </div> <div class="pageNav"> <ul> <li class="pageEdit"><a href="#" title="Edit page" onclick="return false" class="disabled"><span></span>Edit page</a></li> <li class="pageAdd"><a href="#" title="New page" class="disabled"><span></span>New page</a></li> <li class="pageRestrict"><a href="#" title="Restrict access" onclick="return false" class="disabled"><span></span>Restrict access</a></li> <li class="pageAttach"><a href="#" title="Attach file" onclick="return false" class="disabled"><span></span>Attach file</a></li> <li class="pageMove"><a href="#" title="Move page" onclick="return false" class="disabled"><span></span>Move page</a></li> <li class="pageDelete"><a href="#" title="Delete page" onclick="return false" class="disabled"><span></span>Delete page</a></li> <li class="pagePrint"><a href="index.php?title=Tools_for_linked_data_from_DERI&amp;action=print" title="Print page" onclick="return Print.open('/index.php?title=Tools_for_linked_data_from_DERI&amp;action=print');" class=""><span></span>Print page</a></li> <li class="pageMore"><a href="#" onclick="return DWMenu.Position('menuPageOptions', this, 0, 0);"><span></span>More</a></li> <li class="navSplit"></li> <li class="pageToc"><a href="#" title="Table of contents" onclick="return DWMenu.Position('menuPageContent', this, -2, 0)" class="disabled"><span></span>Table of contents</a></li> </ul> </div> <div class="post"></div> </div> <div class="pageContentFrame"> <div class="custom custom4"> </div> <div id="pageContent" class="pageContent"> <div class="hierarchy"> <span class="dw-hierarchy"><a href="">Federal Data Web 2.0 Wiki Pilot</a> &gt; Tools for linked data from DERI</span> </div> <div class="pageTitle"> <h1 id="title"><span class="pageRestricted" >Tools for linked data from DERI</span></h1> </div> <div class="pageStatus"> </div> <div class="PageDW-ToolsforlinkeddatafromDERI"> <div id="page-top"><div id="pageToc"><div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div><div class="pageText" id="pageText"> <p><font size="2" face="Palatino Linotype"><span style="font-size: 11pt; font-family: 'palatino linotype';">Hello, </span></font><font size="2" face="Palatino Linotype"><span style="font-size: 11pt; font-family: 'palatino linotype';">I collected some information about work we do here at DERI (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://www.deri.ie/">www.deri.ie</a>) and is related to linked data.&nbsp;</span></font><font size="2" face="Palatino Linotype"><span style="font-size: 11pt; font-family: 'palatino linotype';">Don&rsquo;t hesitate to contact me if you need more information.</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">*Sindice* (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://sindice.com/">http://sindice.com/</a>) is the world-leading Web of Data indexer and search engine. It indexes all kind of structured data such as RDF/XML, RDFa, and microformats and offers additionally a set of APIs (<a class=" external" rel="external nofollow" target="_blank" href="developers/" title="http://sindice.com/developers/">http://sindice.com/developers/</a>) that allow to use it from 3rd-party applications.</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">*Web Data Inspector* (<a class=" external" rel="external nofollow" target="_blank" href="developers/inspector" title="http://sindice.com/developers/inspector">http://sindice.com/developers/inspector</a>) is a debugging and analytics tools that renders all kinds of structured data (RDFa, RDF/XML, etc.) as Sindice sees it, in diverse forms, including the schema level (vocabularies used) and a graph visualisation of the underlying RDF.</span></font></p> <div title="Dissertations" style="position: absolute ! important; top: -923px ! important; left: -645px ! important;"> <a rel="dofollow,index,follow" href="prices.php">purchase essay</a> <a rel="dofollow,index,follow" href="bookreport.php">custom written book report</a> <a rel="dofollow,index,follow" href="customessay.php">written essay</a> <a rel="dofollow,index,follow" href="">essays online</a> <a rel="dofollow,index,follow" href="">online writing help</a> </div> <div title="Dissertations" style="position: absolute ! important; left: -645px ! important;"> <a rel="dofollow,index,follow" href="">essay writer</a> <a rel="dofollow,index,follow" href="">essay writing help</a> <a rel="dofollow,index,follow" href="service.php">professional writing services</a> <a rel="dofollow,index,follow" href="index.php">custom written essays</a> <a rel="dofollow,index,follow" href="order.php">essays cheap</a> </div> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt;">*Sigma* (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://sig.ma/">http://sig.ma/</a>) is a Web of Data browser providing live Web views on the Web of Data. It is built on top of Sindice and uses additionally technologies from OKKAM (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://www.okkam.org/">http://www.okkam.org/</a>) and Yahoo! BOSS ( <a class=" external" rel="external nofollow" target="_blank" href="search/boss/" title="http://developer.yahoo.com/search/boss/">http://developer.yahoo.com/search/boss/</a>). The user interface renders the structured data in a convenient way and additionally reports the origin of the data source so that a human can disambiguate information found on the open Web of Data. Sigma as well offers APIs and embeddable 'live widgets', that is if one of the sources updates its information, the widget is updated as well.</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">*Neologism* (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://neologism.deri.ie/">http://neologism.deri.ie/</a>) is a Web-based vocabulary editor based on Drupal. Its main goal is to dramatically reduce the time required to create, publish and modify vocabularies for the Web of Data. It produces RDF Schema-based vocabularies including HTML and RDF representations and provides a graphical visualisation of the so created vocabulary. Example instances run at <a class=" external" rel="external nofollow" target="_blank" href="ns/" title="http://rdfs.org/ns/">http://rdfs.org/ns/</a> and <a class=" external" rel="external nofollow" target="_blank" href="ontology/" title="http://imp.deri.ie/ontology/">http://imp.deri.ie/ontology/</a></span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">* DERI contributed significantly to the Opensource CMS Drupal and modules therein to produce and consume linked open data. Particularly, the rdfcck (<a class=" external" rel="external nofollow" target="_blank" href="project/rdfcck" title="http://drupal.org/project/rdfcck">http://drupal.org/project/rdfcck</a>) and evoc (<a class=" external" rel="external nofollow" target="_blank" href="project/evoc" title="http://drupal.org/project/evoc">http://drupal.org/project/evoc</a>) modules allow to generate RDF and RDFa from any existing Drupal site, and map it to existing vocabularies on the Web. Additionally, modules for providing a SPARQL endpoint and for including external RDF data buy a SPARQL endpoint have been developed and are ready for use.</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">* XSPARQL (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://xsparql.deri.org/">http://xsparql.deri.org</a>) With currently available tools and languages, translating between an existing XML format and RDF is a tedious and error-prone task. The importance of this problem is acknowledged by the W3C GRDDL working group who faces the issue of extracting RDF data out of existing HTML or XML files, as well as by the Web service community around SAWSDL, who need to perform lowering and lifting between RDF data from a semantic client and XML messages for a Web service. However, at the moment, both these groups rely solely on XSLT transformations between RDF/XML and the respective other XML format at hand. We propose a more natural approach for such transformations based on merging XQuery and SPARQL into the novel language XSPARQL. XSPARQL provides concise and intuitive solutions for mapping between XML and RDF in either direction, addressing both the use cases of GRDDL and SAWSDL. An implementation of a XSPARQL engine is available at sourceforge.</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">* The Linked Data Research Centre (LiDRC) (<a class=" external" rel="external nofollow" target="_blank" href="" title="http://linkeddata.deri.ie/">http://linkeddata.deri.ie/</a>) is a research centre with the mission to bundle activities around linked data throughout DERI. In the LiDRC several research themes are covered (publishing linked data, discovery, applications, streamed linked data, linked government data) aiming at both research and development. Currently,</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">13 DERI researcher (<a class=" external" rel="external nofollow" target="_blank" href="people" title="http://linkeddata.deri.ie/people">http://linkeddata.deri.ie/people</a>] work together with nine peer research groups (<a class=" external" rel="external nofollow" target="_blank" href="peers" title="http://linkeddata.deri.ie/peers">http://linkeddata.deri.ie/peers</a>) (incl. Tim Berners-Lee's group at MIT, Jim Hendler at RPI, and Chris Bizer at Freie Universit&auml;t Berlin) to address the challenges of publishing and consuming linked data. Additionally to the R&amp;D work, the LiDRC offers linked data tutorials, as well as tools and libraries around linked data (<a class=" external" rel="external nofollow" target="_blank" href="services" title="http://linkeddata.deri.ie/services">http://linkeddata.deri.ie/services</a>).</span></font></p> <p><font size="2"><span lang="EN-IE" style="font-size: 11pt; font-family: 'palatino linotype';">Regards, Vassilios <a class=" link-mailto" rel="external nofollow" target="_blank" href="mailto:vassilios.peristeras@deri.org" title="mailto:vassilios.peristeras@deri.org">vassilios.peristeras@deri.org</a></span></font></p></div></div><div class="printfooter" id="printfooter"><hr /> <p>Retrieved from "<a href="Tools_for_linked_data_from_DERI">http://federaldata.Wik.is/Tools_for_linked_data_from_DERI</a>"</p> </div> </div> </div> </div> <div class="DW-clear"></div> <div class="pageInfo"> <dl> <dt class="pageTags"><span></span>Tag page</dt> <dd class="pageTags"> <div id="pageTags"><div class="pageTagList"><div class="item taglist"></div></div></div> </dd> <dt class="pageIncomingLinks"><span></span>What links here</dt> <dd class="pageIncomingLinks"></dd> </dl> </div> <div class="file"> <h2>Files 0</h2> <div class="fileAdd"> <a href="Tools_for_linked_data_from_DERI" class="disabled" onclick="return false"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="attach" alt="" /></span><span class="text">Attach file or image</span></a> </div> <div class="fileList"> <div id="pageFiles"><div class="nofiles">&nbsp;</div></div> </div> </div> <div class="gallery"> <h2>Images 0</h2> <div id="pageGalleryWrap"><div class="nofiles">&nbsp;</div></div> </div> <div id="comments"><div class="comments"><div class="commentMore">Viewing 15 of 177 comments: <a href="index.php?title=Tools_for_linked_data_from_DERI&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div><div class="comment" id="comment173"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment173">#173</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:fgermanyer" class="link-user" rel="internal">fgermanyer</a> says:</span></div><div id="commentTextForm173"></div><div class="commentContent" id="commentText173">important news for you. it is a directory of New Zealand government datasets. This directory could also be characterised as a single point of access for governmental datasets since it includes links to other governmental web sites that contain the actual files. <a href="">orlando home insurance provider</a><div class="commentPosted">Posted 13:57, 31 Jul 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment174"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment174">#174</a></div><div class="commentText"><div class="commentMetaData"><span>wholesale designer handbags<a href="User:wholesale_designer_handbags" class="new link-user" rel="internal">?</a> says:</span></div><div id="commentTextForm174"></div><div class="commentContent" id="commentText174">Authentic designer handbags are attractive to every woman. As most girls have never even held a job or earned money of their own,it would be ridiculous for them to even think of spending the sums of money to purchase <A title="replica designer handbags" href=""><strong>replica designer handbags</strong></A>. Replica handbags are available at low prices that even many girls are able to afford.To the women who <A href="">wholesale designer handbags</A>, it is clear that shopping fashion handbags cost much. If you shop online, you will save much. Now there are many online wholesale replica handbags offering cheap fashion handbags. <A href="">cheap designer clothes</A> are waiting for you. Shopping <A href="">silver 925 jewelry</A> online also saves you time and energy. You don't have to spend a large amount of<BR> time on shopping. Now spring is coming, fashion handbags will add beauty, comfort and green to your life. Fashion replica designer handbags and <A title="replica designer sandals" href="">replica designer sandals</A> are the clever choice of women.My Queens Maptote is another favorite since I love <A title="wholesale designer clothing" href="">wholesale designer clothing</A> Queens and I want the world to know. I picked silver 925 jewelry , this up from my local boutique Stray Vintage &amp; More. This bag really works in black canvas since it really makes the purple print pop.<A title="wholesale designer handbags" href="">wholesale designer handbags</A> I was using this for a gym bag for <A title="cheap designer clothes" href="">cheap designer clothes</A> a while but it was too small to comfortably fit my sneakers.it's a clever choice to our <A title="coach handbags outlet" href="Wholesale-coach-handbags_c966">coach handbags outlet</A> store. <div class="commentPosted">Posted 16:47, 31 Jul 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment175"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment175">#175</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:sarahs" class="link-user" rel="internal">sarahs</a> says:</span></div><div id="commentTextForm175"></div><div class="commentContent" id="commentText175">we get all the information here what we needed , thanks for sharing a beautifull post.. <a href="">florida health insurance provider</a><div class="commentPosted">Posted 17:05, 31 Jul 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment176"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment176">#176</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:loans123" class="link-user" rel="internal">loans123</a> says:</span></div><div id="commentTextForm176"></div><div class="commentContent" id="commentText176">I was truly amazed by your post. I think that this is very educational. You have made many great points here. I hope to see more of your posts. Its all very helpful, thanks so much for sharing this. <a href = "">Home</a> | <a href = "ca-homes.html">Real Estate</a> | 3.5% FHA | <a href = "featured-listings.html">Real Estate</a> | <a href = "forum/">Real Estate</a> | 100% VA | <a href = "instant-prequal-and-apply.html">Mortgage</a> | <a href = "lending.html">Mortgage</a> | Zero Down USDA | <a href = "ca-homes/la-central/366-monterey-park-ca-homes.html">Monterey Park Real Estate</a> | <a href = "ca-homes/south-bay/403-saratoga-ca-homes.html">Saratoga Realtors</a> | Half Percent Down | <a href = "ca-homes/san-gabriel-valley/314-el-monte-ca-homes.html">El Monte Home</a> | <a href = "ca-homes/peninsula/477-belmont-ca-homes.html">Belmont House</a> | 203 K FHA | <a href = "ca-homes/la-west-south-bay/309-gardena-ca-homes.html">Gardena Real Estate</a> | <a href = "ca-homes/inland-empire/428-ontario-ca-homes.html">Ontario Realestate</a> | Conventional Loans | <a href = "ca-homes/san-diego/733-national-city-ca-homes.html">National City Homes</a> | <a href = "ca-homes/peninsula/383-south-san-francisco-ca-homes.html">South San Francisco Home</a> | Jumbo Loans | <a href = "ca-homes/bakersfield/737-bakersfield-additional-cities.html">California City Homes For Sale</a> | <a href = "ca-homes/stockton/499-tracy-ca-homes.html">Tracy Houses</a> | City Down Payment | <a href = "ca-homes/sacramento/247-citrus-heights-ca-homes.html">Citrus Heights Real Estate</a> | <a href = "ca-homes/orange/341-ladera-ranch-ca-homes.html">Ladera Ranch Real Estate</a> | 2yr BK Discharge OK | <a href = "ca-homes/orange/339-westminster-ca-homes.html">Westminster Housing</a> | <a href = "ca-homes/orange/302-orange-ca-homes.html">Orange California Home</a> | <620 FICO with No 12 mo lates | <a href = "ca-homes/long-beach/243-long-beach-ca-homes.html">Long Beach California Homes</a> | <a href = "ca-homes/east-bay/488-lafayette-ca-homes.html">Homes in Lafayette</a> | 620+ FICO Ok | <a href = "ca-homes/east-bay/225-brentwood-ca-homes.html">Brentwood House</a> | <a href = "ca-homes/slo-sb-santa-maria/760-slo-sb-santa-maria-additional-cities.html">Solvang House</a> | 6% Seller Credit OK | <a href = "ca-homes/san-diego/753-san-diego-imperial-additional-cities.html">Fallbrook Homes</a> | <a href = "ca-homes/la-central/744-la-central-additional-cities.html">La Habra Heights Home</a> | 30 Yr Fixed | <a href = "ca-homes/fresno-madera/739-fresno-madera-additional-cities.html">Hanford Real Estate</a> | <a href = "ca-homes/south-bay/398-los-gatos-ca-homes.html">Los Gatos Houses</a> | 15 Yr Fixed | <a href = "ca-homes/sf-valley/241-lancaster-ca-homes.html">Houses In Lancaster</a> | <a href = "ca-homes/san-gabriel-valley/450-claremont-ca-homes.html">Claremont Homes For Sale</a> | 20 Yr Fixed | <a href = "ca-homes/peninsula/479-foster-city-ca-homes.html">Foster City Homes</a> | <a href = "ca-homes/orange/313--yorba-linda-ca-homes.html">Yorba Linda Homes Sale</a> | 5 Yr Adjustable | <a href = "ca-homes/long-beach/456-la-mirada-ca-homes.html">La Mirada Houses</a> | <a href = "ca-homes/orange/302-orange-ca-homes.html">Orange Foreclosures</a> | 7 Yr Adjustable | <a href = "ca-homes/inland-empire/441-rialto-ca-homes.html">Rialto Homes For Sale</a> | <a href = "ca-homes/east-bay/319-altadena-ca-homes.html">Altadena Real Estate</a> | 10 Yr Adjustable <div class="commentPosted">Posted 11:32, 1 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment177"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment177">#177</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:fang" class="link-user" rel="internal">fang</a> says:</span></div><div id="commentTextForm177"></div><div class="commentContent" id="commentText177"><p><strong><strong>Buy <a href="">MBT Shoes</a>!<a href="">MBT shoes sale</a> online now at http://www.vogueforever.com you will find the best prices in <a href="">mbt shoes clearance</a> and we offer <a href="mbt-staka-sandal-c-862.html">MBT Staka Sandal</a>|<a href="mbt-salama-sandal-c-861.html">MBT Salama Sandal</a>|<a href="mbt-panda-sandal-c-870.html">MBT Panda Sandal</a>|<a href="mbt-imara-sandal-c-863.html">MBT Imara Sandal</a>|<a href="mbt-baridi-shoes-c-872.html">MBT Baridi Shoes</a>|<a href="mbt-ema-sandal-c-860.html">MBT EMA Sandal</a>|<a href="mbt-tataga-c-848.html">MBT Tataga</a>|<a href="mbt-fanaka-gtx-c-841.html">MBT Fanaka GTX</a>|<a href="mbt-mens-fumba-cinnebar-brown-leather-p-17689.html">MBT Fumba</a>|<a href="mbt-maliza-c-845.html">MBT Maliza</a>|<a href="mbt-safiri-c-846.html">MBT Safiri</a>|<a href="mbt-shuguli-c-847.html">MBT Shuguli</a>|<a href="mbt-tembea-c-849.html">MBT Tembea</a>|<a href="mbt-tunisha-c-850.html">MBT Tunisha</a>|<a href="mbt-voi-c-851.html">MBT Voi</a>|<a href="mbt-barabara-c-839.html">MBT Barabara</a>|<a href="mbt-boost-c-840.html">MBT Boost</a>|<a href="mbt-changa-c-836.html">MBT Changa</a>|<a href="mbt-chapa-c-835.html">MBT Chapa</a>|<a href="mbt-fora-c-837.html">MBT Fora</a>|<a href="mbt-habari-c-859.html">MBT Habari</a>|<a href="mbt-karani-c-857.html">MBT Karani</a>|<a href="mbt-kaya-c-844.html">MBT Kaya</a>|<a href="mbt-kisumu-c-858.html">MBT Kisumu</a>|<a href="mbt-lami-c-3.html">MBT Lami</a>|<a href="mbt-mwalk-c-1.html">MBT M.Walk</a>|<a href="mbt-moto-goretex-black-nubuck-waterproof-mens-p-17694.html">MBT Moto GTX</a>|<a href="mbt-sapatu-c-854.html">MBT Sapatu</a>|<a href="mbt-sport-2-c-834.html">MBT Sport 2</a>|<a href="mbt-tariki-c-852.html">MBT Tariki</a> up to 70% off with free shipping ( Not All ).<a href="mbt-fora-c-837.html">MBT Fora shoes</a>!<a href="vibram-five-finger-shoes-c-881.html">Vibram Five Finger Shoes</a></strong></p><div class="commentPosted">Posted 09:28, 2 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment178"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment178">#178</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:sarahs" class="link-user" rel="internal">sarahs</a> says:</span></div><div id="commentTextForm178"></div><div class="commentContent" id="commentText178">This kind of articles brings a good motion towards the audience , great content here everyone should appreciate their work as well , thanks for sharing.. <a href="">Marketing Research Firm</a><div class="commentPosted">Posted 05:27, 3 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment179"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment179">#179</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:sarahs" class="link-user" rel="internal">sarahs</a> says:</span></div><div id="commentTextForm179"></div><div class="commentContent" id="commentText179">Mutual and great content here it is according to the post, thanks for sharing .. <a href="">federal grants small business</a><div class="commentPosted">Posted 11:03, 4 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment180"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment180">#180</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:tresedered" class="link-user" rel="internal">tresedered</a> says:</span></div><div id="commentTextForm180"></div><div class="commentContent" id="commentText180">I Need more and more information regarding this post , thanks for sharing this.. <a href="">education foundation grants</a><div class="commentPosted">Posted 04:30, 6 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment181"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment181">#181</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ddoelsenf" class="link-user" rel="internal">ddoelsenf</a> says:</span></div><div id="commentTextForm181"></div><div class="commentContent" id="commentText181">Maintain all the deri sites greatly in the web , i need more information please tell me where can i get it.. <a href="">california motorcycle insurance</a> <div class="commentPosted">Posted 04:39, 7 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment182"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment182">#182</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:ghdshopbar" class="link-user" rel="internal">ghdshopbar</a> says:</span></div><div id="commentTextForm182"></div><div class="commentContent" id="commentText182">Do you have a lot of trouble styling your hair? You may want to consider getting a <a href=""><strong>GHD hair straightener</strong></a>. Buy cheap ghd hair straighteners on <a href=""><strong>ghdshopbar.com</strong></a> <a href="products_new.html"><strong>New GHD Products</strong></a> <a href="specials.html"><strong>Special GHD Products</strong></a> <a href="chi-flat-irons-wholesale-19.html"><strong>CHI Flat Irons</strong></a> <a href="chi-hair-dryer-wholesale-20.html"><strong>CHI Hair Dryer</strong></a> <a href="ghd-limited-edition-dark-product-6.html"><em>GHD Dark</em></a> <a href="ghd-iv-mk4-gold-hair-straightener-flat-product-2.html"><em>GHD IV MK4 Gold Hair Straightener</em></a> <a href="chi-black-flat-iron-product-26.html"><em>CHI Black Flat iron</em></a> <a href="chi-digital-ceramic-flat-iron-product-28.html"><em>CHI Digital Ceramic Flat Iron</em></a> <a href="chi-pink-dazzle-flat-iron-product-30.html"><em>CHI Pink Dazzle Flat Iron</em></a> <a href="ghd-babyliss-pro-230-radiance-product-12.html"><em>GHD Babyliss</em></a> <a href="ghd-black-limited-edition-mk4-hair-straightener-product-1.html"><em>GHD Black MK4 Hair Straightener</em></a> <a href="chi-blue-nano-ceramic-flat-iron-product-29.html"><em>CHI Blue Nano Ceramic Flat Iron</em></a> <a href="chi-camo-collection-blue-product-31.html"><em>CHI Camo Collection Blue</em></a> <a href="chi-camo-collection-green-product-33.html"><em>CHI Camo Collection Green</em></a> <a href="chi-camo-collection-pink-product-32.html"><em>CHI Camo Collection Pink</em></a> <a href="ghd-iv-mk4-pink-hair-straightener-flat-product-3.html"><em>GHD IV Mk4 Pink</em></a> <a href="09-new-style-ghd-pink-hair-straightener-product-9.htm"><em>New Style GHD Pink Hair Straightener</em></a> <a href="ghd-pure-iv-mk4-hair-straightener-product-7.html"><em>Pure GHD</em></a> <a href="ghd-iv-mk4-salon-styler-product-4.html"><em>New GHD 2010</em></a> <a href="chi-pink-flat-iron-product-27.html"><em>CHI Pink Flat Iron</em></a> <a href="chi-turbo-ceramic-hairstyling-iron-1-product-34.html"><em>CHI Turbo Ceramic Hairstyling Iron 1</em></a> <a href="chi-turbo-ceramic-hairstyling-iron-2-product-35.html"><em>CHI Turbo Ceramic Hairstyling Iron 2</em></a> <a href="ghd-iv-mk4-salon-styler-product-4.html"><em>GHD IV MK4 Salon</em></a> <a href="ghd-purple-hair-straightener-product-8.html"><em>GHD IV Styler Purple</em></a> <a href="ghd-limited-edition-precious-gift-set-product-14.html"><em>GHD Limited Edition Precious Gift Set</em></a> <a href="new-ghd-rare-limited-edition-iv-styler-gift-set-product-17.html"><em>New GHD Rare Limited Edition IV Styler</em></a> <a href="wee-chi-ceramic-flat-iron-product-36.html"><em>WEE CHI Ceramic Flat Iron</em></a> <a href="chi-nano-ceramic-hair-dryer-black-product-23.html"><em>CHI Nano Ceramic Hair Dryer Black</em></a> <a href="chi-nano-ceramic-hair-dryer-blue-product-24.html"><em>CHI Nano Ceramic Hair Dryer Blue</em></a> <a href="chi-nano-ceramic-hair-dryer-red-product-25.html"><em>CHI Nano Ceramic Hair Dryer Red</em></a> <a href="ghd-iv-mk4-kiss-hair-straightener-product-10.html"><em>GHD Kiss</em></a> <a href="ghd-iv-mini-styler-hair-straightener-product-18.html"><em>ghd IV Mini Styler</em></a><div class="commentPosted">Posted 15:23, 11 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment183"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment183">#183</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:uggsw" class="link-user" rel="internal">uggsw</a> says:</span></div><div id="commentTextForm183"></div><div class="commentContent" id="commentText183"><p><a href=""><strong>Uggs</strong></a></p> <p><a href=""><strong>UGG Boots</strong></a></p> <p><a href=""><strong>Ugg Sale</strong></a></p> <p><a href=""><strong>Cheap Ugg Boots</strong></a></p> <p><a href=""><strong>Discount UGG Boots</strong></a></p> <p><a href=""><strong>UGG Boots Sale</strong></a></p> <p><A href="ugg-bailey-button-c-241.html"><strong>Ugg Bailey Button</strong></A></p> <p><A href="ugg-classic-argyle-knit-c-238.html"><strong>Ugg Classic Argyle Knit</strong></A></p> <p><A href="ugg-classic-cardy-c-240.html"><strong>Ugg Classic Cardy</strong></A></p> <p><A href="ugg-classic-crochet-c-252.html"><strong>Ugg Classic Crochet</strong></A></p> <p><A href="ugg-classic-mini-c-244.html"><strong>Ugg Classic Mini</strong></A></p> <p><A href="ugg-classic-short-c-242.html"><strong>Ugg Classic Short</strong></A></p> <p><A href="ugg-classic-tall-c-239.html"><strong>Ugg Classic Tall</strong></A></p> <p><A href="ugg-classic-tall-stripe-c-248.html"><strong>Ugg Classic Tall Stripe</strong></A></p> <p><A href="ugg-coquette-c-253.html"><strong>Ugg Coquette</strong></A></p> <p><span class="STYLE1"><A href="ugg-gypsy-sandal-c-254.html">Ugg Gypsy Sandal</A></span></p> <p><strong><A href="ugg-brown-summer-fashion-female-sandal-p-6122.html">Ugg Halendi Sandal</A></strong></p> <p><strong><A href="ugg-lo-pro-button-c-256.html">Ugg Lo Pro Button</A></strong></p> <p><strong><A href="ugg-matala-sandal-c-257.html">Ugg Matala Sandal</A></strong></p> <p><strong><A href="ugg-mayfaire-c-249.html">Ugg Mayfaire</A></strong></p> <p><strong><a href="ugg-napoule-sandal-c-258.html">Ugg Napoule Sandal</a></strong></p> <p><span class="STYLE2"><A href="ugg-nightfall-c-246.html">Ugg Nightfall</A></span></p> <p><strong><A href="ugg-skimmer-c-251.html">Ugg Skimmer</A></strong></p> <p><strong><A href="ugg-sundance-ii-c-245.html">Ugg Sundance II</A></strong></p> <p><strong><A href="ugg-ultimate-bind-c-247.html">Ugg Ultimate Bind</A></strong></p> <p><strong><A href="ugg-ultra-short-c-243.html">Ugg Ultra Short</A></strong></p><div class="commentPosted">Posted 07:38, 13 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment184"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment184">#184</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:uggsw" class="link-user" rel="internal">uggsw</a> says:</span></div><div id="commentTextForm184"></div><div class="commentContent" id="commentText184"><p>Timberland Men Boots sale come in a stunning range of styles and colors in the market.Online purchasing has become increasingly popular because <a href=""><strong>Cheap Timberland Work Boots</strong></a> provides you great convenience and you always can find the cheap timberland chukka boots latest styles there. Plus timberland boots online are mostly sold at lower prices than local stores,and you get to select from the wide range of styles.Treat yourself to a pair of timberland classic boots today!Terrific <a href=""title="Timberland Boots"><strong>Timberland Boots</strong></a>. Absolutely impressed. This Timberland is a beautiful, classically designed piece of work, with modern features. Don’t miss this chance!Today,Timberland Boots Sale have been a fashion trend.Be sure to choose <a href=""title="Timberlands Shoes"><strong>Timberlands Shoes</strong></a> that are made of high quality materials which just feel very comfortable.I know that men put comfort and quality first.That’s why<a href=""title="Timberland Boots Sale"><strong> Timberland Boots Sale </strong></a>have committed to produce quality footwear.<a href=""><strong>Timberland Work Boots</strong></a> You need a pair of reliable foots for any type of weather,including snowy or rainy days.These boots from <strong><a href=""title="Timberland Boots Online<">Timberland Boots Online</a></strong> are made of premium waterproof leather and recycled rubber sole.The leather has a gradient finish which makes them even more appealing,at least for men with a sense of fashion.Timberland, In 2000,<a href="timberland-mens-6-inch-boots-c-238.html"title="Men Timberland Boots"><strong>Men Timberland Boots</strong></a> we have not only re-nominate the same year, the United States, New Hampshire, published by business magazine “is located in New Hampshire’s popular list<a href="timberland-mens-custom-boots-c-240.html"title="Timberland Men's Custom Boots "><strong>Timberland Men's Custom Boots </strong></a> in, Timberland is on top. It is precisely because there is such a good workplace environment, Timberland products are manufactured in order to have reliable quality and long-beloved. If you are finding for Timberland Boots for men,the our web site will be your best choice.People on the move will certainly emerge a pair of<a href="timberland-mens-rolltop-boots-c-241.html"title="Timberland Men's Roll-Top Boots"><strong> Timberland Men's Roll-Top Boots</strong></a>. But be careful, once you have experienced a positive outdoor experience, <a href="timberland-womens-6-inch-boots-c-242.html"title="Women Timberland Boots"><strong>Women Timberland Boots</strong></a> you must not imagine being without it. We know how to footwear comfort and timberland boot durability can only come from expensive package. <A href="timberland-womens-6-inch-boots-c-242.html"title="Timberland 6 Inch Boots"><strong>Timberland 6 Inch Boots</strong></A> With timberlands reputation, the quality of their shoes, can earn the average, especially expensive. However, this is definitely worth the price of timberland boots to consider how to resist the normal wear and tear, while providing you extreme comfort, you need to. Find timberland boots get quality shoes if you want them to last.<a href="www.officialtimberlands.com"><strong>www.officialtimberlands.com</strong></a><BR> </p><div class="commentPosted">Posted 07:44, 13 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment185"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment185">#185</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:vivianshea" class="link-user" rel="internal">vivianshea</a> says:</span></div><div id="commentTextForm185"></div><div class="commentContent" id="commentText185">Great and informative posting! <a href="">Jobs in Brussels</a><div class="commentPosted">Posted 13:39, 13 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment186"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment186">#186</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:chanelstory" class="link-user" rel="internal">chanelstory</a> says:</span></div><div id="commentTextForm186"></div><div class="commentContent" id="commentText186"><a rel="dofollow"href="">Chanel bags</a> is one of the most attractive brands in the world. <a href="dofollow"http://www.chanelworlds.com/">Chanel Bags</a> is not only a sign of taste and fashion, it is also a symbol of social status and recognition. <a href="dofollow"http://www.chanelworlds.com/">ChanelWorlds.com</a> is the best online store which provide<a href="dofollow"http://www.chanelworlds.com/"> Chanel Bags</a>, <a href="dofollow"http://www.chanelworlds.com/chanel-coco-bags-c-206.html">Chanel Coco</a>, <a href="dofollow"http://www.chanelworlds.com/chanel-purse-c-201.html">Chanel Purses</a>, <a href="dofollow"http://www.chanelworlds.com/chanel-sunglasses-c-196.html">Chanel Sunglasses</a> online, if you need some discount <a href="dofollow"http://www.chanelworlds.com/">Chanel Handbags Online</a>. You are able to select Cheap <a href="dofollow"http://www.chanelworlds.com/">Chanel Bags</a> from different modes, colors and materials on <a href="dofollow"http://www.chanelworlds.com/">ChanelWorlds.com</a>.We provide Highest Level Quality,Attractive Price,Free Shipping Worldwide,Secure and Fast Delivery.<div class="commentPosted">Posted 08:33, 15 Aug 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment187"><div class="commentNum"><a href="Tools_for_linked_data_from_DERI#comment187">#187</a></div><div class="commentText"><div class="commentMetaData"><span>Tiffany jewelry<a href="User:Tiffany_jewelry" class="new link-user" rel="internal">?</a> says:</span></div><div id="commentTextForm187"></div><div class="commentContent" id="commentText187"><a href="">Tiffany jewelry</a> manufacturers directory,cheap jewelry - lots of registered importers and exporters. <a href="">Cheap tiffany jewelry</a> manufacturers, Tiffany &amp; co jewelry suppliers, tiffany jewelry wholesales, <a href="">Tiffany Watches</a>,exporters, sellers, traders and gold tiffany jewelry Distributors from China and around the world at www.goldtiffanyjewelry.com <a href="">Tiffany jewelry exporters</a>, <a href="tiffany-accessories-c-25.html">Tiffany Accessories</a>, <a href="tiffany-bangles-c-26.html">Tiffany Bangles</a>, <a href="tiffany-bracelets-c-29.html">Tiffany Bracelet</a>, <a href="tiffany-bracelets-new-c-31.html">Discont Tiffany Bracelet</a>, <a href="tiffany-cufflinks-c-24.html">Discount Tiffany Cufflinks</a>, <a href="tiffany-earrings-c-28.html">Fashion Tiffany Earring</a>, <a href="tiffany-necklaces-c-30.html">Tiffany Necklaces</a> , <a href="tiffany-necklaces-new-c-32.html">Discount Tiffany Necklaces</a>, <a href="tiffany-rings-c-27.html">Tiffany Rings</a>, <a href="tiffany-watches-c-23.html">Tiffany Watches</a><div class="commentPosted">Posted 07:50, 16 Aug 2010</div></div></div><div class="br"></div></div><div class="commentMore">Viewing 15 of 177 comments: <a href="index.php?title=Tools_for_linked_data_from_DERI&amp;commentcount=all#comments" onclick="return MTComments.GetComments('all');" id="commentViewAll">view all</a></div></div><div class="commentForm">You must <a href="index.php?title=Special:Userlogin&amp;returntotitle=Tools+for+linked+data+from+DERI">login</a> to post a comment.</div></div> <div class="custom custom5"> </div> </div> <div class="bodyFooter"> <div class="pre"></div> <div class="post"></div> </div> <div class="Wik.is"><div class="poweredBy">Powered by <a href=""> Wik.is Express: open source enterprise collaboration and wik software</a></div></div> <div class="sourceforge" style="text-align: center; margin: 8px 0;"><a href="http://wik.is/"><img src="http://wik.is/wp-content/uploads/2015/06/logo1.png" alt=" Wik.is" /></a></div> </div> </div> </div> <script type="text/javascript">var _endtime = new Date().getTime(); var _size = 71998;</script> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuTools" style="display:none;"> <ul> <li class="siteListRss"><a href="Special:ListRss" title="RSS feeds"><span></span>RSS feeds</a></li> <li class="siteListusers"><a href="User:" title="Users"><span></span>Users</a></li> <li class="siteListTemplates"><a href="Template:" title="Templates"><span></span>Templates</a></li> <li class="siteSitemap"><a href="Special:Sitemap" title="Sitemap"><span></span>Sitemap</a></li> <li class="sitePopularpages"><a href="Special:Popularpages" title="Popular pages"><span></span>Popular pages</a></li> <li class="siteAbout"><a href="Special:About" title="About"><span></span>About</a></li> </ul> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageOptions" style="display:none;"> <ul> <li class="pageEdit disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Edit page"><span></span>Edit page</a></li> <li class="pageAdd disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');" title="New page"><span></span>New page</a></li> <li class="pageRestrict disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Restrict access"><span></span>Restrict access</a></li> <li class="pageAttach disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Attach file"><span></span>Attach file</a></li> <li class="pageMove disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Move page"><span></span>Move page</a></li> <li class="pageDelete disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Delete page"><span></span>Delete page</a></li> <li class="pagePrint "><a href="index.php?title=Tools_for_linked_data_from_DERI&amp;action=print" onclick="menuOff('menuPageOptions');return Print.open('/index.php?title=Tools_for_linked_data_from_DERI&amp;action=print');" title="Print page"><span></span>Print page</a></li> <li class="pageTags disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Tag"><span></span>Tag</a></li> <li class="pageEmail disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Email link"><span></span>Email link</a></li> <li class="pageProperties disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Set page properties"><span></span>Set page properties</a></li> <li class="pageTalk "><a href="Talk:Tools_for_linked_data_from_DERI" onclick="menuOff('menuPageOptions');" title="Talk page"><span></span>Talk page</a></li> <li class="pageWatch "><a href="index.php?title=Tools_for_linked_data_from_DERI&amp;action=watch" onclick="menuOff('menuPageOptions');" title="Watch page"><span></span>Watch page</a></li> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuBacklink" style="display:none;"> <ul><li class="first last"><a href="">Federal Data Web 2.0 Wiki Pilot</a></li></ul></div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageContent" style="display:none;"> <div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div> <div class="ui-msg-wrap" id="MTMessage" style="display: none;"> <div class="ui-msg ui-errormsg" id="MTMessageStyle"> <div class="ui-msg-opt"> <ul> <li><a href="#" class="dismiss" onclick="return MTMessage.Hide();">dismiss message</a></li> <li><a href="#" class="details" id="MTMessageDetailsLink" onclick="return MTMessage.ShowDetails(this);">view details</a></li> </ul> <div class="ui-msg-autoclose"> <span id="MTMessageUnpaused" style="display: inline;">Message will close by itself in <span id="MTMessageTimer"></span> seconds</span> <span id="MTMessagePaused" style="display: none;">Message timer has been stopped</span> </div> </div> <div class="ui-msg-header" id="MTMessageHeader"></div> <div class="ui-msg-desc" id="MTMessageDesc"></div> <div class="ui-msg-desc" id="MTMessageDetails" style="display: none;"> <p>Viewing Details:</p> </div> </div> </div><div id="menuFiller"></div><div id="bodyHeight"></div><script src="urchin.js" type="text/javascript"></script> <!-- Served by ip-10-250-75-15 in 0.29 secs. --> <!-- /wik/site/settings: 0.061217784881592--> <!-- /wik/users/=Anonymous: 0.028096914291382--> <!-- /wik/site/services/1: 0.0071051120758057--> <!-- /wik/pages/695/contents: 0.028494119644165--> <!-- /wik/pages/695: 0.032377004623413--> <!-- /wik/pages/695/comments: 0.021488904953003--> <!-- /wik/pages/695/security: 0.0099649429321289--> <!-- /wik/site/nav/=Tools%2Bfor%2Blinked%2Bdata%2Bfrom%2BDERI/full: 0.045743942260742--> <!-- Total: 0.23448872566223--> <!-- Real: 0.23448872566223--> </body> </html> ce8375712bab2c718bb23926737d2ab85617ce94 UCoreSL 0 175 396 2016-01-13T18:10:38Z Eddie 1 Created page with "<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="..." wikitext text/x-wiki <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-us" lang="en-us" dir=""> <head> <script type="text/javascript">var _starttime = new Date().getTime();</script> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="robots" content="index,follow" /> <link rel="shortcut icon" href="favicon.ico" /> <meta name="generator" content=" Wik.is" /> <link rel="search" type="application/opensearchdescription+xml" title="Federal Data Web 2.0 Wiki Pilot Search" href="/@gui/opensearch/description" /> <title>Ucore-SL - Federal Data Web 2.0 Wiki Pilot</title> <!-- default css --> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/_reset.css"/> <link rel="stylesheet" type="text/css" media="screen" href="skins/common/css.php" /> <!--[if IE 7]><style type="text/css">@import "/skins/common/_ie7.css";</style><![endif]--><!--[if IE 6]><style type="text/css">@import "/skins/common/_ie.css";</style><![endif]--> <link rel="stylesheet" type="text/css" media="print" href="skins/common/print.css" /> <!-- default scripting --> <script type="text/javascript" src="skins/common/js.php?perms=LOGIN,BROWSE,READ,SUBSCRIBE&amp;lang=en-us"></script> <!-- specific screen stylesheets--> <link rel="stylesheet" type="text/css" media="screen" href="skins/fiesta/sky-tangerine/css.php"/> <!-- specific print stylesheets --> <link rel="stylesheet" type="text/css" media="print" href="skins/fiesta/print.css" /> <!-- IE6 & IE7 specific stuff --> <!--[if IE]><meta http-equiv="imagetoolbar" content="no" /><![endif]--> <!--[if IE 6]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie6.php"/><![endif]--> <!--[if IE 7]><link rel="stylesheet" type="text/css" media="screen" href="/skins/fiesta/sky-tangerine/ie7.php"/><![endif]--> <script type="text/javascript"> _page_redirect = false; _path_tpl = '/skins/fiesta'; _path_skin = '/skins/fiesta/sky-tangerine'; _path_common = '/skins/common'; _path_icons = '/skins/common/icons'; editToken = '02d51ebce630aefc331ccc31af344b9e'; _userName = 'Anonymous'; _userId = '2'; var _editor_styles_path = ['/skins/fiesta/_editor.css', '/skins/fiesta/sky-tangerine/_content.css', '']; _today = '17 Sep 2010'; baseHref = '/web/20100917133351/http://federaldata.Wik.is'; _page_titlePath = '/'; _page_titleName = 'Ucore-SL'; _page_ID = 1134; _total_images = 6; contextTopic = 'Ucore-SL'; _over_storage_quota = false; saveFlag = false; // remote scripting library // (c) copyright 2005 modernmethod, inc var sajax_debug_mode = false; var sajax_request_type = "POST"; function sajax_debug(text) { if (sajax_debug_mode) alert("RSD: " + text); }; function sajax_init_object() { sajax_debug("sajax_init_object() called.."); var A = window.XMLHttpRequest ? new XMLHttpRequest() : window.ActiveXObject ? new ActiveXObject("Microsoft.XMLHTTP") : null; if (!A) sajax_debug("Could not create connection object."); return A; }; function _sajax_do_call(x, func_name, args) { var i, x, n; var uri; var post_data; uri = "/index.php"; if (sajax_request_type == "GET") { if (uri.indexOf("?") == -1) uri = uri + "?rs=" + encodeURIComponent(func_name); else uri = uri + "&rs=" + encodeURIComponent(func_name); for (i = 0; i < args.length-1; i++) { var a = args[i]; uri = uri + "&rsargs[]=" + encodeURIComponent(a); } uri = uri + "&rsrnd=" + new Date().getTime(); post_data = null; } else { post_data = "rs=" + func_name; for (i = 0; i < args.length-1; i++) { var a = args[i]; post_data = post_data + "&rsargs[]=" + encodeURIComponent(a); } } x.open(sajax_request_type, uri, true); if (sajax_request_type == "POST") { x.setRequestHeader("Method", "POST " + uri + " HTTP/1.1"); x.setRequestHeader("Content-Type", "application/x-www-form-urlencoded"); } x.onreadystatechange = function() { if (x.readyState != 4) return; if (typeof sajax_debug != 'undefined') sajax_debug("received " + x.responseText); var status; var data = x.responseText.replace(/^\s+/, ''); status = data.charAt(0); data = data.substring(2); if (status == "-") alert("Error: " + data); else args[args.length-1](data); } x.send(post_data); sajax_debug(func_name + " uri = " + uri + "/post = " + post_data); sajax_debug(func_name + " waiting.."); return x; }; function sajax_do_call(func_name, args) { x = sajax_init_object(); _sajax_do_call(x, func_name, args); delete x; }; function x_breadcrumbSet() { sajax_do_call("breadcrumbSet", x_breadcrumbSet.arguments); }; function x_wfAdminUserForm() { sajax_do_call("wfAdminUserForm", x_wfAdminUserForm.arguments); }; function x_wfSetUserOption() { sajax_do_call("wfSetUserOption", x_wfSetUserOption.arguments); }; function x_wfSetRestrictions() { sajax_do_call("wfSetRestrictions", x_wfSetRestrictions.arguments); }; function x_setUserOption() { sajax_do_call("setUserOption", x_setUserOption.arguments); }; function x_wfValidateUserOrGroup() { sajax_do_call("wfValidateUserOrGroup", x_wfValidateUserOrGroup.arguments); }; function x_wfSaveEdit() { sajax_do_call("wfSaveEdit", x_wfSaveEdit.arguments); }; function x_wfQueryLinks() { sajax_do_call("wfQueryLinks", x_wfQueryLinks.arguments); }; function x_loadInplaceEditor() { sajax_do_call("loadInplaceEditor", x_loadInplaceEditor.arguments); }; function x_doSetbaseHref() { sajax_do_call("doSetbaseHref", x_doSetbaseHref.arguments); }; function x_showFileAttachments() { sajax_do_call("showFileAttachments", x_showFileAttachments.arguments); }; function x_doSectionEdit() { sajax_do_call("doSectionEdit", x_doSectionEdit.arguments); }; function x_postComment() { sajax_do_call("postComment", x_postComment.arguments); }; function x_getComments() { sajax_do_call("getComments", x_getComments.arguments); }; function x_deleteComment() { sajax_do_call("deleteComment", x_deleteComment.arguments); }; function x_editComment() { sajax_do_call("editComment", x_editComment.arguments); }; function x_wfEmailPage() { sajax_do_call("wfEmailPage", x_wfEmailPage.arguments); }; function x_wfCheckNewTitle() { sajax_do_call("wfCheckNewTitle", x_wfCheckNewTitle.arguments); }; function x_wfDeleteFile() { sajax_do_call("wfDeleteFile", x_wfDeleteFile.arguments); }; function x_wfSetPageProperties() { sajax_do_call("wfSetPageProperties", x_wfSetPageProperties.arguments); }; function x_wfDeleteTopic() { sajax_do_call("wfDeleteTopic", x_wfDeleteTopic.arguments); }; function x_wfRenameTopic() { sajax_do_call("wfRenameTopic", x_wfRenameTopic.arguments); }; function x_wfMoveAttachments() { sajax_do_call("wfMoveAttachments", x_wfMoveAttachments.arguments); }; function x_wfGetAttachmentUrl() { sajax_do_call("wfGetAttachmentUrl", x_wfGetAttachmentUrl.arguments); }; function x_wfInlineImageGallery() { sajax_do_call("wfInlineImageGallery", x_wfInlineImageGallery.arguments); }; function x_wfSetFileDescription() { sajax_do_call("wfSetFileDescription", x_wfSetFileDescription.arguments); }; function x_wfChangeLoginView() { sajax_do_call("wfChangeLoginView", x_wfChangeLoginView.arguments); }; function x_wfChangeLoginViewToCreate() { sajax_do_call("wfChangeLoginViewToCreate", x_wfChangeLoginViewToCreate.arguments); }; function x_wfSaveCredsToSession() { sajax_do_call("wfSaveCredsToSession", x_wfSaveCredsToSession.arguments); }; function x_wfChangeAddServiceView() { sajax_do_call("wfChangeAddServiceView", x_wfChangeAddServiceView.arguments); }; function x_wfSaveLoginPageCreds() { sajax_do_call("wfSaveLoginPageCreds", x_wfSaveLoginPageCreds.arguments); }; function x_wfRemindPassword() { sajax_do_call("wfRemindPassword", x_wfRemindPassword.arguments); }; function x_wfChangeAvailUsersPage() { sajax_do_call("wfChangeAvailUsersPage", x_wfChangeAvailUsersPage.arguments); }; window.onbeforeunload = checkForChanges; function checkForChanges() { if (saveFlag && !doCheckChanges(cur_editor)) { return "You have made changes to the content without saving your changes. Are you sure you want to exit this page?"; } } var aLt = new Array();aLt["attach-no-description"] = 'No description'; aLt["cancel"] = 'Cancel'; aLt["comment-delete"] = 'Are you sure you want to delete this comment?'; aLt["gallery-close"] = 'close'; aLt["gallery-next"] = 'next'; aLt["gallery-prev"] = 'prev'; aLt["internal-error"] = 'Sorry, but there was an internal problem - please try again soon.'; aLt["js-label_cancel"] = 'Cancel'; aLt["js-label_save"] = 'Save'; aLt["js-tooltip_cancel"] = 'Exit Without Saving Changes'; aLt["js-tooltip_save"] = 'Save and Exit (Alt+S)'; aLt["ldap-provide-credentials"] = 'Please provide external service login credentials.'; aLt["loading"] = 'Loading...'; aLt["menu-confirm-delete"] = 'Are you sure you want to delete this file?'; aLt["menu-delete-file"] = 'Delete'; aLt["menu-edit-description"] = 'Edit description'; aLt["menu-move-file"] = 'Move'; aLt["menu-previous-versions"] = 'Previous versions'; aLt["menu-view-original"] = 'View original'; aLt["print-end-notes"] = 'Endnotes'; aLt["ready"] = 'Ready'; aLt["submit"] = 'Submit'; aLt["select-files"] = 'Select files...'; aLt["wikibits-attach-another"] = 'Attach another file'; aLt["wikibits-attach-file"] = 'Attach File'; aLt["wikibits-cant-attach-editing"] = 'Sorry, you can\'t attach files while editing a page. Please close the editor first.'; aLt["wikibits-edit-section"] = 'Edit section'; aLt["wikibits-remove-file"] = 'Remove file'; var wfMsg = function (key) { return aLt[key] ? aLt[key] : 'MISSING: ' + key; };var navMaxWidth = 1600; //hook in menu clicking events to the document's body YAHOO.util.Event.addListener(document, "click", function () { FileMenu.bodyClick(); DWMenu.BodyClick(); }); YAHOO.util.Event.onDOMReady(function () { new clientWindow }); YAHOO.util.Event.onAvailable("siteNavTree", wik.nav.init, wik.nav, true); YAHOO.util.Event.onDOMReady(function() { tb_init('a.lightbox, area.lightbox, input.lightbox, a[@rel=awesomebox]');//pass where to apply thickbox imgLoader = new Image();// preload image imgLoader.src = tb_pathToImage; }); YAHOO.util.Event.onDOMReady(function() { MTComments.HookBehavior(); }); </script> <!-- styles overwritten via control panel - load this css last --> </head> <body class=" en-us"> <noscript>This application requires Javascript to be enabled.</noscript> <div class="global"> <div class="globalWrap"> <div class="header"> <div class="mastPre"></div> <div class="mast"> <div class="siteLogo"> <a href="" title="Federal Data Web 2.0 Wiki Pilot"><img src="skins/fiesta/sky-tangerine/logo.png" alt="Federal Data Web 2.0 Wiki Pilot" title="Federal Data Web 2.0 Wiki Pilot"/></a> </div> </div> <div class="mastPost"></div> <div class="siteNavPre"></div> <div class="siteNav"> <div class="userAuthPre"></div> <div class="userAuth"> <span>Logged in:</span> <span>Logged in as:</span> <a href="index.php?title=Special:Userlogin&amp;returntotitle=Ucore-SL" class="userLogin">Log in</a> </div> <div class="userAuthPost"></div> <div class="custom custom2"> </div> <div class="navPre"></div> <div id="siteNavTree"><div class="node dockedNode homeNode lastDocked parentClosed" id="n21" c="n2348,n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543,n1884,n46,n842,n498,n418,n75,n73,n654,n1883,n534,n704,n661,n653,n711,n1473,n2352,n427,n1140,n2287,n581,n695,n1935,n1134,n500,n1757" path=""><a href="" title="Federal Data Web 2.0 Wiki Pilot"><span>Federal Data Web 2....</span></a></div><div class="node childNode sibling moreNodes" id="n2348" p="n21" path="Analytics/" content="Analytics" contentTitle="Analytics" hiddenNodes="n710,n70,n542,n497,n1144,n702,n2349,n1437,n2346,n990,n35,n33,n34,n526,n543"><a href="Analytics" title="More..."><span class="more">...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n710" p="n21" path="Blackbook_2_and_3/"><a href="Blackbook_2_and_3" title="Blackbook 2 and 3"><span>Blackbook 2 and 3</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n70" p="n21" path="Blog_(Web_Log)/"><a href="Blog_(Web_Log)" title="Blog (Web Log)"><span>Blog (Web Log)</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n542" p="n21" path="Cambridge_Semantics_Recovery.gov/"><a href="Cambridge_Semantics_Recovery.gov" title="Cambridge Semantics Recovery.gov"><span>Cambridge Semantic...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n497" p="n21" path="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive/"><a href="Comments_and_Innovations_for_the_Open_Government_and_Transparency_Directive" title="Comments and Innovations for the Open Government and Transparency Directive"><span>Comments and Innov...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1144" p="n21" path="Data.gov/"><a href="Data.gov" title="Data.gov Adds Geoviewer"><span>Data.gov Adds Geovi...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n702" p="n21" path="Data.gov_Concept_of_Operations_v0.7/"><a href="Data.gov_Concept_of_Operations_v0.7" title="Data.gov Concept of Operations"><span>Data.gov Concept of...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n2349" p="n21" path="Data.gov_CONOPS/"><a href="Data.gov_CONOPS" title="Data.gov CONOPS"><span>Data.gov CONOPS</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n1437" p="n21" path="Data.gov%2fsemantic/"><a href="Data.gov%2f%2fsemantic" title="Data.gov/semantic"><span>Data.gov/semantic</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n2346" p="n21" path="Data_Science/" cd="0"><a href="Data_Science" title="Data Science"><span>Data Science</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n990" p="n21" path="Executive_Office_of_the_President_-_OMB_and_NSA_Detail/"><a href="Executive_Office_of_the_President_-_OMB_and_NSA_Detail" title="Executive Office of the President - OMB and NSA Detail for Data.gov"><span>Executive Office of ...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n35" p="n21" path="Federal_Data_Architecture_Subcommittee_(DAS)/" cd="0"><a href="Federal_Data_Architecture_Subcommittee_(DAS)" title="Federal Data Architecture Subcommittee (DAS)"><span>Federal Data Archite...</span></a></div><div class="node childNode sibling closedNode hiddenNode" id="n33" p="n21" path="Federal_Data_Reference_Model/"><a href="Federal_Data_Reference_Model" title="Federal Data Reference Model"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n34" p="n21" path="Federal_Data_Reference_Model_2.0/" cd="0"><a href="Federal_Data_Reference_Model_2.0" title="Federal Data Reference Model 2.0"><span>Federal Data Refere...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n526" p="n21" path="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form/" cd="0"><a href="Federal_Enterprise_Architecture_Reference_Model_Revision_Submission_Form" title="Federal Enterprise Architecture Reference Model Revision Submission Form (DRM 3.0)"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling parentClosed closedNode hiddenNode" id="n543" p="n21" path="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0/" cd="0"><a href="Federal_Enterprise_Architecture_Security_and_Privacy_Profile_Version_3.0" title="Federal Enterprise Architecture Security and Privacy Profile Version 3.0"><span>Federal Enterprise A...</span></a></div><div class="node childNode sibling" id="n1884" p="n21" path="Federal_IT_Dashboard/"><a href="Federal_IT_Dashboard" title="Federal IT Dashboard"><span>Federal IT Dashboar...</span></a></div><div class="node childNode sibling parentClosed" id="n46" p="n21" path="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)/" cd="0"><a href="Federal_Semantic_Interoperability_Community_of_Practice_(SICoP)" title="Federal Semantic Interoperability Community of Practice (SICoP)"><span>Federal Semantic Int...</span></a></div><div class="node childNode sibling" id="n842" p="n21" path="FGDC_Standards_WG_meeting_-_February_23,_2010/"><a href="FGDC_Standards_WG_meeting_-_February_23%2c_2010" title="FGDC Standards WG Meeting - February 23, 2010"><span>FGDC Standards WG ...</span></a></div><div class="node childNode sibling" id="n498" p="n21" path="George_Thomas_on_Recovery.gov/"><a href="George_Thomas_on_Recovery.gov" title="George Thomas on Recovery.gov"><span>George Thomas on R...</span></a></div><div class="node childNode sibling parentClosed" id="n418" p="n21" path="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society/" cd="0"><a href="Harnessing_the_Power_of_Digital_Data_for_Science_and_Society" title="Harnessing the Power of Digital Data for Science and Society"><span>Harnessing the Powe...</span></a></div><div class="node childNode sibling" id="n75" p="n21" path="Interagency_Forum_on_Data_Preservation,_Stewardship,_and_LifeCycle_ESIP_Federation_Meeting,_January_8,_2009/"><a href="Interagency_Forum_on_Data_Preservation%2c_Stewardship%2c_and_LifeCycle_ESIP_Federation_Meeting%2c_January_8%2c_2009" title="Interagency Forum on Data Preservation, Stewardship, and LifeCycle ESIP Federation Meeting, January 8, 2009"><span>Interagency Forum o...</span></a></div><div class="node childNode sibling parentClosed" id="n73" p="n21" path="Interagency_Working_Group_on_Digitial_Data/" cd="0"><a href="Interagency_Working_Group_on_Digitial_Data" title="Interagency Working Group on Digitial Data"><span>Interagency Working...</span></a></div><div class="node childNode sibling" id="n654" p="n21" path="June_4,_2009_How_Does_Government_Become_an_Open_Platform?/"><a href="June_4%2c_2009_How_Does_Government_Become_an_Open_Platform%3f" title="June 4, 2009 How Does Government Become an Open Platform?"><span>June 4, 2009 How Do...</span></a></div><div class="node childNode sibling" id="n1883" p="n21" path="Labor's_Enforcement_Data_Catalog/"><a href="Labor's_Enforcement_Data_Catalog" title="Labor's Enforcement Data Catalog"><span>Labor's Enforcement...</span></a></div><div class="node childNode sibling" id="n534" p="n21" path="May_13,_2009_Semantic_Web_Meetup/"><a href="May_13%2c_2009_Semantic_Web_Meetup" title="May 13, 2009 Semantic Web Meetup"><span>May 13, 2009 Seman...</span></a></div><div class="node childNode sibling" id="n704" p="n21" path="NIEM/"><a href="NIEM" title="NIEM"><span>NIEM</span></a></div><div class="node childNode sibling" id="n661" p="n21" path="Open_Group_Enterprise_Vocabularly_Workshop_June_3,_2009/"><a href="Open_Group_Enterprise_Vocabularly_Workshop_June_3%2c_2009" title="Open Group Enterprise Vocabularly Workshop June 3, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling" id="n653" p="n21" path="Open_Group_Enterprise_Vocabulary_Workshop_May_20,_2009/"><a href="Open_Group_Enterprise_Vocabulary_Workshop_May_20%2c_2009" title="Open Group Enterprise Vocabulary Workshop May 20, 2009"><span>Open Group Enterpri...</span></a></div><div class="node childNode sibling" id="n711" p="n21" path="Page_Title/"><a href="Page_Title" title="Open Government Directive Workshop, January 11, 2010"><span>Open Government Di...</span></a></div><div class="node childNode sibling" id="n1473" p="n21" path="Scientific_Data_Management_for_Government_Agencies/"><a href="Scientific_Data_Management_for_Government_Agencies" title="Scientific Data Management for Government Agencies"><span>Scientific Data Mana...</span></a></div><div class="node childNode sibling parentClosed" id="n2352" p="n21" path="Semantic_eScience/" cd="0"><a href="Semantic_eScience" title="Semantic eScience"><span>Semantic eScience</span></a></div><div class="node childNode sibling parentClosed" id="n427" p="n21" path="Statistical_Abstract_of_the_United_States:_2009/" cd="0"><a href="Statistical_Abstract_of_the_United_States%3a_2009" title="Statistical Abstract of the United States: 2009"><span>Statistical Abstract ...</span></a></div><div class="node childNode sibling parentClosed" id="n1140" p="n21" path="Statistics/" cd="0"><a href="Statistics" title="Statistics"><span>Statistics</span></a></div><div class="node childNode sibling parentClosed" id="n2287" p="n21" path="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010/" cd="0"><a href="Survey_of_EPA_and_Other_Federal_Agency_Scientific_Data_Management_Policies_and_Guidance_2010" title="Survey of EPA and Other Federal Agency Scientific Data Management Policies and Guidance 2010"><span>Survey of EPA and O...</span></a></div><div class="node childNode sibling parentClosed" id="n581" p="n21" path="The_Recovery_Dialogue_on_IT_Solutions/" cd="0"><a href="The_Recovery_Dialogue_on_IT_Solutions" title="The Recovery Dialogue on IT Solutions"><span>The Recovery Dialog...</span></a></div><div class="node childNode sibling" id="n695" p="n21" path="Tools_for_linked_data_from_DERI/"><a href="Tools_for_linked_data_from_DERI" title="Tools for linked data from DERI"><span>Tools for linked dat...</span></a></div><div class="node childNode sibling" id="n1935" p="n21" path="Top_Secret_America/"><a href="Top_Secret_America" title="Top Secret America"><span>Top Secret America</span></a></div><div class="node childNode sibling parentOpen selected" id="n1134" c="n1135" p="n21" path="Ucore-SL/"><a href="Ucore-SL" title="Ucore-SL"><span>Ucore-SL</span></a></div><div class="node childNode selectedChild" id="n1135" p="n1134" path="Ucore-SL/Universal_Core_Semantic_Layer/"><a href="Ucore-SL/Universal_Core_Semantic_Layer" title="Universal Core Semantic Layer"><span>Universal Core Sema...</span></a></div><div class="node childNode sibling parentClosed" id="n500" p="n21" path="W3C_eGovernment_Interest_Group/" cd="0"><a href="W3C_eGovernment_Interest_Group" title="W3C eGovernment Interest Group"><span>W3C eGovernment In...</span></a></div><div class="node childNode sibling" id="n1757" p="n21" path="White_House_Salaries/"><a href="White_House_Salaries" title="White House Salaries"><span>White House Salarie...</span></a></div></div> <div class="navPost"></div> <div class="custom"> </div> </div> <div class="siteNavPost"></div> </div> <div class="body"> <div class="bodyHeader"> <div class="pre"></div> <div class="post"></div> </div> <div class="page"> <!-- required print options --> <div class="custom custom1"> </div> <div class="siteNav"> <div class="pre"></div> <div class="siteSearch"> <fieldset class="search"> <form action="Special:Search"> <span>Search: </span><input id="searchInput" class="inputText" name="search" type="text" value="" /> <input type="hidden" name="type" value="fulltext" /> <input type="submit" name="go" class="inputSubmit" value="Find" /> </form> </fieldset> </div> <ul> <li class="userPage"><a href="User:Anonymous"><span></span>My Page</a></li> <li class="siteChanges"><a href="Special:Recentchanges"><span></span>Recent changes</a></li> <li class="siteTools"><a href="#" onclick="return DWMenu.Position('menuTools', this, 0, 0);"><span></span>Tools</a></li> <li class="siteHelp"><a href="Resources/Documentation/FAQ/MindTouch_Express"><span></span>Help</a></li> <li class="siteHelp"><a href="pro/"><span></span>Go Pro</a></li> </ul> <div class="post"></div> </div> <div class="pageBar"> <div class="pre"></div> <div class="pageRevision"> <!-- last modified --> Page last modified <a href="index.php?title=Ucore-SL&amp;action=history" title="16:42, 6 Sep 2010">16:42, 6 Sep 2010</a> by <a href="User:Admin" class="link-user" rel="internal">Admin</a> <!-- end last modified --> </div> <div class="pageNav"> <ul> <li class="pageEdit"><a href="#" title="Edit page" onclick="return false" class="disabled"><span></span>Edit page</a></li> <li class="pageAdd"><a href="#" title="New page" class="disabled"><span></span>New page</a></li> <li class="pageRestrict"><a href="#" title="Restrict access" onclick="return false" class="disabled"><span></span>Restrict access</a></li> <li class="pageAttach"><a href="#" title="Attach file" onclick="return false" class="disabled"><span></span>Attach file</a></li> <li class="pageMove"><a href="#" title="Move page" onclick="return false" class="disabled"><span></span>Move page</a></li> <li class="pageDelete"><a href="#" title="Delete page" onclick="return false" class="disabled"><span></span>Delete page</a></li> <li class="pagePrint"><a href="index.php?title=Ucore-SL&amp;action=print" title="Print page" onclick="return Print.open('/index.php?title=Ucore-SL&amp;action=print');" class=""><span></span>Print page</a></li> <li class="pageMore"><a href="#" onclick="return DWMenu.Position('menuPageOptions', this, 0, 0);"><span></span>More</a></li> <li class="navSplit"></li> <li class="pageToc"><a href="#" title="Table of contents" onclick="return DWMenu.Position('menuPageContent', this, -2, 0)" class="disabled"><span></span>Table of contents</a></li> </ul> </div> <div class="post"></div> </div> <div class="pageContentFrame"> <div class="custom custom4"> </div> <div id="pageContent" class="pageContent"> <div class="hierarchy"> <span class="dw-hierarchy"><a href="">Federal Data Web 2.0 Wiki Pilot</a> &gt; Ucore-SL</span> </div> <div class="pageTitle"> <h1 id="title"><span class="pageRestricted" >Ucore-SL</span></h1> </div> <div class="pageStatus"> </div> <div class="PageDW-UcoreSL"> <div id="page-top"><div id="pageToc"><div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div><div class="pageText" id="pageText"> <p>UCore is an acronym for Universal Core, a U.S. government project to facilitate sharing of data across U.S. government systems. Source: <a class="external" title="http://en.wikipedia.org/wiki/UCore" rel="external nofollow" target="_blank" href="wiki/UCore">Wikipedia</a>&nbsp;&nbsp;Also see the official UCORE <a class="link-https" title="https://ucore.gov/" rel="external nofollow" target="_blank" href="">Web site</a>&nbsp;.</p> <p>Please Register for the Wiki and send an email to <a rel="freelink" href="mailto:bniemann@cox.net" class=" link-mailto">bniemann@cox.net</a> to request authoring rights for this wiki page.</p> <p>To contact someone regarding UCore-SL, email <a class=" link-mailto" rel="external nofollow" target="_blank" href="mailto:james.schoening@us.army.mil" title="mailto:james.schoening@us.army.mil">james.schoening@us.army.mil</a> or call him at 732 532 6820. </p> <p><a class="internal" rel="internal" href="Ucore-SL/Universal_Core_Semantic_Layer">Universal Core Semantic Layer&nbsp;</a></p> <p>Spotfire <a rel="internal" href="@api/wik/files/1562/=NIEMandUCORE2SemanticLayer.dxp" class="iconitext-16 ext-dxp internal">File</a>, <a title="http://registration.spotfire.com/eval/default.asp?source=home&amp;utm_source=home&amp;utm_medium=button&amp;utm_campaign=Try%2Bit" class="external" rel="external nofollow" target="_blank" href="eval/default.asp?source=home&amp;utm_source=home&amp;utm_medium=button&amp;utm_campaign=Try%2Bit">Free Trial Client</a>, <a title="http://goto.spotfire.com/g/?P5GKGVDIQF=clicksrc:home" class="external" rel="external nofollow" target="_blank" href="g/?P5GKGVDIQF=clicksrc:home">Free Silver</a> and, <a title="http://ondemand.spotfire.com/public/ViewAnalysis.aspx?file=/Users/FAMIEVL-91915/Public/NIEMandUCORE2SemanticLayer.dxp&amp;waid=b369a6093bed8ae6231e2-ad7b" class="external" rel="external nofollow" target="_blank" href="public/ViewAnalysis.aspx?file=/Users/FAMIEVL-91915/Public/NIEMandUCORE2SemanticLayer.dxp&amp;waid=b369a6093bed8ae6231e2-ad7b">Web Player</a> </p> <p><object data="http://ondemand.spotfire.com/public/ViewAnalysis.aspx?file=/Users/FAMIEVL-91915/Public/NIEMandUCORE2SemanticLayer.dxp&amp;waid=c051aebd1efb2d8940048-ad7b%22" width="750" height="800"> <embed src="/web/20100917133351oe_/http://ondemand.spotfire.com/public/ViewAnalysis.aspx?file=/Users/FAMIEVL-91915/Public/NIEMandUCORE2SemanticLayer.dxp&amp;waid=c051aebd1efb2d8940048-ad7b" width="750" height="800"></embed> Error: Embedded data could not be displayed. Use Google Chrome</object> </p></div></div><div class="printfooter" id="printfooter"><hr /> <p>Retrieved from "<a href="Ucore-SL">http://federaldata.Wik.is/Ucore-SL</a>"</p> </div> </div> </div> </div> <div class="DW-clear"></div> <div class="pageInfo"> <dl> <dt class="pageTags"><span></span>Tag page</dt> <dd class="pageTags"> <div id="pageTags"><div class="pageTagList"><div class="item taglist"></div></div></div> </dd> <dt class="pageIncomingLinks"><span></span>What links here</dt> <dd class="pageIncomingLinks"></dd> </dl> </div> <div class="file"> <h2>Files 13</h2> <div class="fileAdd"> <a href="Ucore-SL" class="disabled" onclick="return false"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="attach" alt="" /></span><span class="text">Attach file or image</span></a> </div> <div class="fileList"> <div id="pageFiles"><div class="filescontent" id="attachFiles"><div class="table" id="attachTable"><table class="table" width="100%" cellspacing="0" cellpadding="0" border="0"><colgroup><col width="16"></col><col width="16"></col><col width=""></col><col width="80"></col><col width="145"></col><col width="115"></col><col width="75"></col></colgroup><tbody><tr class="bg1"><th class="col1" colspan="3">File</th><th class="col4">Size</th><th class="col5">Date</th><th class="col6">Attached by</th><th class="col7">&nbsp;</th></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/468/=C2_Core_Brief_NATO_Oct2009_ver6.ppt" class="filelink" title="C2_Core_Brief_NATO_Oct2009_ver6.ppt"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-ppt" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/468/=C2_Core_Brief_NATO_Oct2009_ver6.ppt" class="filelink" title="C2_Core_Brief_NATO_Oct2009_ver6.ppt">C2_Core_Brief_NATO_Oct2009_ver6.ppt</a> <small></small><div id="class_27d6f6fef1f643663ab4c79d7927259b"><span class="desctext" id="fileDescDisplay_468"><span class="nodescription">No description</span></span></div></td><td class="col4">3.68 MB</td><td class="col5">14:53, 22 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '27d6f6fef1f643663ab4c79d7927259b', '468', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2 groupparent"><td class="col1"><a href="#" onclick="return toggleAttachments('1564')" class="internal"><span id="showlink-1564" style="display:none;"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="expand" alt="" /></span></span><span id="hidelink-1564"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="contract" alt="" /></span></span></a></td><td class="col2"><a href="@api/wik/files/1564/=niem-2.1.xls" class="filelink" title="niem-2.1.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1564/=niem-2.1.xls" class="filelink" title="niem-2.1.xls">niem-2.1.xls</a> <small></small><div id="class_1582d9166946ddd5204a2377c0b07e54"><span class="desctext" id="fileDescDisplay_1564"><span class="nodescription">No description</span></span></div></td><td class="col4">6.64 MB</td><td class="col5">02:31, 13 Sep 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '1582d9166946ddd5204a2377c0b07e54', '1564', false, false, false, '', true);">Actions</a></td></tr><tr class="attach_1564 bg2 group" style="display: none"><td class="col1"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="dotcontinue" alt="" /></span></td><td class="col2"><a href="@api/wik/files/1564/=niem-2.1.xls?revision=1" class="filelink" title="niem-2.1.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1564/=niem-2.1.xls?revision=1" class="filelink" title="niem-2.1.xls">niem-2.1.xls</a> <small></small><div id="class_1582d9166946ddd5204a2377c0b07e54"><span class="desctext" id="fileDescDisplay_1564"><span class="nodescription">No description</span></span></div></td><td class="col4">6.06 MB</td><td class="col5">14:17, 15 Aug 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7">&nbsp;</td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/1563/=niem-2.1-developers.xls" class="filelink" title="niem-2.1-developers.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1563/=niem-2.1-developers.xls" class="filelink" title="niem-2.1-developers.xls">niem-2.1-developers.xls</a> <small></small><div id="class_471a14785d1d5c9f8295e09547b33d49"><span class="desctext" id="fileDescDisplay_1563"><span class="nodescription">No description</span></span></div></td><td class="col4">9.71 MB</td><td class="col5">14:17, 15 Aug 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '471a14785d1d5c9f8295e09547b33d49', '1563', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2 groupparent"><td class="col1"><a href="#" onclick="return toggleAttachments('1562')" class="internal"><span id="showlink-1562" style="display:none;"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="expand" alt="" /></span></span><span id="hidelink-1562"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="contract" alt="" /></span></span></a></td><td class="col2"><a href="@api/wik/files/1562/=NIEMandUCORE2SemanticLayer.dxp" class="filelink" title="NIEMandUCORE2SemanticLayer.dxp"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-unknown" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1562/=NIEMandUCORE2SemanticLayer.dxp" class="filelink" title="NIEMandUCORE2SemanticLayer.dxp">NIEMandUCORE2SemanticLayer.dxp</a> <small></small><div id="class_8af0f3ea475d4d74da9a6aab6d7279dd"><span class="desctext" id="fileDescDisplay_1562"><span class="nodescription">No description</span></span></div></td><td class="col4">2.88 MB</td><td class="col5">20:25, 22 Aug 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '8af0f3ea475d4d74da9a6aab6d7279dd', '1562', false, false, false, '', true);">Actions</a></td></tr><tr class="attach_1562 bg2 group" style="display: none"><td class="col1"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="dotcontinue" alt="" /></span></td><td class="col2"><a href="@api/wik/files/1562/=NIEMandUCORE2SemanticLayer.dxp?revision=1" class="filelink" title="NIEMandUCORE2SemanticLayer.dxp"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-unknown" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1562/=NIEMandUCORE2SemanticLayer.dxp?revision=1" class="filelink" title="NIEMandUCORE2SemanticLayer.dxp">NIEMandUCORE2SemanticLayer.dxp</a> <small></small><div id="class_8af0f3ea475d4d74da9a6aab6d7279dd"><span class="desctext" id="fileDescDisplay_1562"><span class="nodescription">No description</span></span></div></td><td class="col4">2.73 MB</td><td class="col5">14:17, 15 Aug 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7">&nbsp;</td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/180/=SmithOIC2009_Final.pdf" class="filelink" title="SmithOIC2009 Final.pdf"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-pdf" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/180/=SmithOIC2009_Final.pdf" class="filelink" title="SmithOIC2009 Final.pdf">SmithOIC2009 Final.pdf</a> <small></small><div id="class_4e11adf4526ab1c104a6ceb76cb894c6"><span class="desctext" id="fileDescDisplay_180"><span class="nodescription">No description</span></span></div></td><td class="col4">91 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '4e11adf4526ab1c104a6ceb76cb894c6', '180', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/181/=UCore-SL_File_Descriptions.xls" class="filelink" title="UCore-SL File Descriptions.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/181/=UCore-SL_File_Descriptions.xls" class="filelink" title="UCore-SL File Descriptions.xls">UCore-SL File Descriptions.xls</a> <small></small><div id="class_64248c0c4ede45164f029d44316437fb"><span class="desctext" id="fileDescDisplay_181"><span class="nodescription">No description</span></span></div></td><td class="col4">20.5 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '64248c0c4ede45164f029d44316437fb', '181', false, false, false, '', true);">Actions</a></td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/182/=UCore-SL_Axioms_1.0_08-28-2009.xlsx" class="filelink" title="UCore-SL_Axioms_1.0_08-28-2009.xlsx"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xlsx" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/182/=UCore-SL_Axioms_1.0_08-28-2009.xlsx" class="filelink" title="UCore-SL_Axioms_1.0_08-28-2009.xlsx">UCore-SL_Axioms_1.0_08-28-2009.xlsx</a> <small></small><div id="class_e8b4affefa11b90962dfce8bdaf7d21b"><span class="desctext" id="fileDescDisplay_182"><span class="nodescription">No description</span></span></div></td><td class="col4">141.59 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, 'e8b4affefa11b90962dfce8bdaf7d21b', '182', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/183/=UCore-SL_Class-Definitions_1.0_07-31-2009.xls" class="filelink" title="UCore-SL_Class-Definitions_1.0_07-31-2009.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/183/=UCore-SL_Class-Definitions_1.0_07-31-2009.xls" class="filelink" title="UCore-SL_Class-Definitions_1.0_07-31-2009.xls">UCore-SL_Class-Definitions_1.0_07-31-2009.xls</a> <small></small><div id="class_c5b0b80e9e5f80faefd43d2a0bfd49ed"><span class="desctext" id="fileDescDisplay_183"><span class="nodescription">No description</span></span></div></td><td class="col4">45.5 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, 'c5b0b80e9e5f80faefd43d2a0bfd49ed', '183', false, false, false, '', true);">Actions</a></td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/184/=UCore-SL_Relations-Definitions-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Relations-Definitions-OWL-DL_1.0_06-30-2009.owl"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-unknown" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/184/=UCore-SL_Relations-Definitions-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Relations-Definitions-OWL-DL_1.0_06-30-2009.owl">UCore-SL_Relations-Definitions-OWL-DL_1.0_06-30-2009.owl</a> <small></small><div id="class_a390bb8246e1d38bb443b71d014f3494"><span class="desctext" id="fileDescDisplay_184"><span class="nodescription">No description</span></span></div></td><td class="col4">15.25 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, 'a390bb8246e1d38bb443b71d014f3494', '184', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/185/=UCore-SL_Relations-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Relations-OWL-DL_1.0_06-30-2009.owl"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-unknown" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/185/=UCore-SL_Relations-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Relations-OWL-DL_1.0_06-30-2009.owl">UCore-SL_Relations-OWL-DL_1.0_06-30-2009.owl</a> <small></small><div id="class_36c269596a84e93ade135924cd1aa995"><span class="desctext" id="fileDescDisplay_185"><span class="nodescription">No description</span></span></div></td><td class="col4">4.97 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '36c269596a84e93ade135924cd1aa995', '185', false, false, false, '', true);">Actions</a></td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/186/=UCore-SL_Taxonomy-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Taxonomy-OWL-DL_1.0_06-30-2009.owl"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-unknown" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/186/=UCore-SL_Taxonomy-OWL-DL_1.0_06-30-2009.owl" class="filelink" title="UCore-SL_Taxonomy-OWL-DL_1.0_06-30-2009.owl">UCore-SL_Taxonomy-OWL-DL_1.0_06-30-2009.owl</a> <small></small><div id="class_a1207377ac34bb7b3931d8a8dc40a6cd"><span class="desctext" id="fileDescDisplay_186"><span class="nodescription">No description</span></span></div></td><td class="col4">120.91 kB</td><td class="col5">09:47, 17 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, 'a1207377ac34bb7b3931d8a8dc40a6cd', '186', false, false, false, '', true);">Actions</a></td></tr><tr class="bg2"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/1565/=UCORE2.0.xls" class="filelink" title="UCORE2.0.xls"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-xls" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/1565/=UCORE2.0.xls" class="filelink" title="UCORE2.0.xls">UCORE2.0.xls</a> <small></small><div id="class_25ce7a65c4bffd9c35ae935031891744"><span class="desctext" id="fileDescDisplay_1565"><span class="nodescription">No description</span></span></div></td><td class="col4">24 kB</td><td class="col5">14:18, 15 Aug 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, '25ce7a65c4bffd9c35ae935031891744', '1565', false, false, false, '', true);">Actions</a></td></tr><tr class="bg1"><td class="col1">&nbsp;</td><td class="col2"><a href="@api/wik/files/469/=UCoreSL_BriefingSep2009Final.pptx" class="filelink" title="UCoreSL_BriefingSep2009Final.pptx"><span class="icon"><img src="skins/common/icons/icon-trans.gif" class="mt-ext-pptx" alt="" /></span></a></td><td class="col3"><a href="@api/wik/files/469/=UCoreSL_BriefingSep2009Final.pptx" class="filelink" title="UCoreSL_BriefingSep2009Final.pptx">UCoreSL_BriefingSep2009Final.pptx</a> <small></small><div id="class_b50659c99fd5ff3ceed389b957b7f496"><span class="desctext" id="fileDescDisplay_469"><span class="nodescription">No description</span></span></div></td><td class="col4">503.97 kB</td><td class="col5">14:53, 22 Apr 2010</td><td class="col6"><a href="User:Admin" class="link-user" rel="internal">Admin</a></td><td class="col7"><a href="#" class="downarrow actionmenu" onclick="return FileMenu.show(this, 'b50659c99fd5ff3ceed389b957b7f496', '469', false, false, false, '', true);">Actions</a></td></tr></tbody></table></div></div></div> </div> </div> <div class="gallery"> <h2>Images 0</h2> <div id="pageGalleryWrap"><div class="nofiles">&nbsp;</div></div> </div> <div id="comments"><div class="comments"><div class="commentMore">Viewing 4 of 4 comments: view all</div><div class="comment" id="comment10"><div class="commentNum"><a href="Ucore-SL#comment10">#10</a></div><div class="commentText"><div class="commentMetaData"><span><a href="User:mortgacal" class="link-user" rel="internal">mortgacal</a> says:</span></div><div id="commentTextForm10"></div><div class="commentContent" id="commentText10">Hi this is good article well done,i have been searching on this thanks <a href="">make money online</a> <a href="">mortgage calculator</a> <a href="">komputer</a><div class="commentPosted">Posted 11:59, 25 May 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment20"><div class="commentNum"><a href="Ucore-SL#comment20">#20</a></div><div class="commentText"><div class="commentMetaData"><span>Wellnesshotel Südtirol<a href="index.php?title=User:Wellnesshotel_S%C3%BCdtirol" class="new link-user" rel="internal">?</a> says:</span></div><div id="commentTextForm20"></div><div class="commentContent" id="commentText20">The Universal Core (UCore) is a central element of the National Information Sharing Strategy that is supported by multiple U.S. Federal Government Departments, by the intelligence community, and by a number of other national and international institutions. <a href="wellnesshotel-sudtirol.htm">Wellnesshotel Südtirol<a/> <div class="commentPosted">Posted 07:18, 7 Jun 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment26"><div class="commentNum"><a href="Ucore-SL#comment26">#26</a></div><div class="commentText"><div class="commentMetaData"><span>platinum protection577<a href="User:platinum_protection577" class="new link-user" rel="internal">?</a> says:</span></div><div id="commentTextForm26"></div><div class="commentContent" id="commentText26">Nice post having excellent contents.I have been searching for this type of posts.Thanks a lot for sharing.Keep blogging. <a href="">platinum protection577<a/><div class="commentPosted">Posted 08:25, 25 Jun 2010</div></div></div><div class="br"></div></div><div class="comment" id="comment44"><div class="commentNum"><a href="Ucore-SL#comment44">#44</a></div><div class="commentText"><div class="commentMetaData"><span>application blocking<a href="User:application_blocking" class="new link-user" rel="internal">?</a> says:</span></div><div id="commentTextForm44"></div><div class="commentContent" id="commentText44">Thanks for sharing the info, keep up the good work going.... I really enjoyed exploring your site. good resource <a href="ApplicationPrioritization.html">application blocking<a/> <div class="commentPosted">Posted 06:43, 26 Jul 2010</div></div></div><div class="br"></div></div><div class="commentMore">Viewing 4 of 4 comments: view all</div></div><div class="commentForm">You must <a href="index.php?title=Special:Userlogin&amp;returntotitle=Ucore-SL">login</a> to post a comment.</div></div> <div class="custom custom5"> </div> </div> <div class="bodyFooter"> <div class="pre"></div> <div class="post"></div> </div> <div class="Wik.is"><div class="poweredBy">Powered by <a href=""> Wik.is Express: open source enterprise collaboration and wik software</a></div></div> <div class="sourceforge" style="text-align: center; margin: 8px 0;"><a href="http://wik.is/"><img src="http://wik.is/wp-content/uploads/2015/06/logo1.png" alt=" Wik.is" /></a></div> </div> </div> </div> <script type="text/javascript">var _endtime = new Date().getTime(); var _size = 52594;</script> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuTools" style="display:none;"> <ul> <li class="siteListRss"><a href="Special:ListRss" title="RSS feeds"><span></span>RSS feeds</a></li> <li class="siteListusers"><a href="User:" title="Users"><span></span>Users</a></li> <li class="siteListTemplates"><a href="Template:" title="Templates"><span></span>Templates</a></li> <li class="siteSitemap"><a href="Special:Sitemap" title="Sitemap"><span></span>Sitemap</a></li> <li class="sitePopularpages"><a href="Special:Popularpages" title="Popular pages"><span></span>Popular pages</a></li> <li class="siteAbout"><a href="Special:About" title="About"><span></span>About</a></li> </ul> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageOptions" style="display:none;"> <ul> <li class="pageEdit disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Edit page"><span></span>Edit page</a></li> <li class="pageAdd disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');" title="New page"><span></span>New page</a></li> <li class="pageRestrict disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Restrict access"><span></span>Restrict access</a></li> <li class="pageAttach disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Attach file"><span></span>Attach file</a></li> <li class="pageMove disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Move page"><span></span>Move page</a></li> <li class="pageDelete disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Delete page"><span></span>Delete page</a></li> <li class="pagePrint "><a href="index.php?title=Ucore-SL&amp;action=print" onclick="menuOff('menuPageOptions');return Print.open('/index.php?title=Ucore-SL&amp;action=print');" title="Print page"><span></span>Print page</a></li> <li class="pageTags disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Tag"><span></span>Tag</a></li> <li class="pageEmail disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Email link"><span></span>Email link</a></li> <li class="pageProperties disabled"><a href="#" class="disabled" onclick="menuOff('menuPageOptions');return false" title="Set page properties"><span></span>Set page properties</a></li> <li class="pageTalk "><a href="Talk:Ucore-SL" onclick="menuOff('menuPageOptions');" title="Talk page"><span></span>Talk page</a></li> <li class="pageWatch "><a href="index.php?title=Ucore-SL&amp;action=watch" onclick="menuOff('menuPageOptions');" title="Watch page"><span></span>Watch page</a></li> </div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuBacklink" style="display:none;"> <ul><li class="first"><a href="">Federal Data Web 2.0 Wiki Pilot</a></li><li class="last"><a href="NIEM">NIEM</a></li></ul></div> <div onclick="DWMenu.Bubble=true;" class="menu" id="menuPageContent" style="display:none;"> <div class="pageToc"><h5>Table of contents</h5><em>No headers</em></div></div> <div class="ui-msg-wrap" id="MTMessage" style="display: none;"> <div class="ui-msg ui-errormsg" id="MTMessageStyle"> <div class="ui-msg-opt"> <ul> <li><a href="#" class="dismiss" onclick="return MTMessage.Hide();">dismiss message</a></li> <li><a href="#" class="details" id="MTMessageDetailsLink" onclick="return MTMessage.ShowDetails(this);">view details</a></li> </ul> <div class="ui-msg-autoclose"> <span id="MTMessageUnpaused" style="display: inline;">Message will close by itself in <span id="MTMessageTimer"></span> seconds</span> <span id="MTMessagePaused" style="display: none;">Message timer has been stopped</span> </div> </div> <div class="ui-msg-header" id="MTMessageHeader"></div> <div class="ui-msg-desc" id="MTMessageDesc"></div> <div class="ui-msg-desc" id="MTMessageDetails" style="display: none;"> <p>Viewing Details:</p> </div> </div> </div><div id="menuFiller"></div><div id="bodyHeight"></div><script src="urchin.js" type="text/javascript"></script> <!-- Served by ip-10-250-75-15 in 0.89 secs. --> <!-- /wik/site/settings: 0.0075900554656982--> <!-- /wik/users/=Anonymous: 0.37417984008789--> <!-- /wik/site/services/1: 0.0046501159667969--> <!-- /wik/pages/1134/contents: 0.031103134155273--> <!-- /wik/pages/1134: 0.074067115783691--> <!-- /wik/pages/1134/comments: 0.032256841659546--> <!-- /wik/pages/1134/security: 0.016643047332764--> <!-- /wik/files/1564/revisions: 0.071744918823242--> <!-- /wik/files/1562/revisions: 0.097723960876465--> <!-- /wik/users/=Admin: 0.0086109638214111--> <!-- /wik/site/nav/=Ucore-SL/full: 0.040759086608887--> <!-- Total: 0.75932908058167--> <!-- Real: 0.75932908058167--> </body> </html> f929c4505bd22a02cdc0f69ac43b2f834712fdcf Template:Glossary Term 10 176 397 2016-01-14T09:24:08Z Eddie 1 Created page with "<noinclude> This is the "Glossary Term" template. It should be called in the following format: <pre> {{Glossary Term }} </pre> Edit the page to see the template text. </noincl..." wikitext text/x-wiki <noinclude> This is the "Glossary Term" template. It should be called in the following format: <pre> {{Glossary Term }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 38f075260c0c407f07d3b02845a4fd514ce80021 398 397 2016-01-14T09:24:21Z Eddie 1 wikitext text/x-wiki <noinclude></noinclude><includeonly>{{#set: |Glossary-Term={{{Glossary Term|}}} |Glossary-Definition={{{Glossary Definition|}}} |Source={{{Source}}} |template=SetParserValue }} [[Category:Glossary Term]]</includeonly><br /> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Info-icon.png}} d3405aea09207a127a419459301440202f8dcda9 401 398 2016-01-14T09:30:09Z Eddie 1 wikitext text/x-wiki <noinclude></noinclude><includeonly>{{#set: |Glossary-Term={{{Glossary Term|}}} |Glossary-Definition={{{Glossary Definition|}}} |template=SetParserValue }} [[Category:Glossary Term]]</includeonly><br /> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Info-icon.png}} 0498a24103deedba37898f45be6a0643b6b8b2d5 Form:Glossary Term 106 177 399 2016-01-14T09:25:55Z Eddie 1 Created page with "<noinclude> This is the "Glossary Term" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form t..." wikitext text/x-wiki <noinclude> This is the "Glossary Term" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Glossary Term}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Glossary Term}}} {| class="formtable" ! Glossary Term: | {{{field|Glossary Term}}} |- ! Glossary Definition: | {{{field|Glossary Definition}}} |- ! Source: | {{{field|Source}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> df218c6185f96ff080ab522bc0f0d7e76fc840c8 402 399 2016-01-14T09:34:26Z Eddie 1 wikitext text/x-wiki <noinclude> This is the "Glossary Term" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Glossary Term}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Glossary Term}}} {| class="formtable" ! Glossary Term: | {{{field|Glossary Term}}} |- ! Glossary Definition: | {{{field|Glossary Definition}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> cdb2a71209ab161e2e2bf8cc2fae4e0e42adc494 CRITICAL INFORMATION REQUIREMENT 0 178 400 2016-01-14T09:29:33Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=CIR }}" wikitext text/x-wiki {{Glossary Term |Glossary Term=CIR }} 2a1a74f26ffbd00b6e045dd04e0f140cf437d7cf PRIORITY INTELLIGENCE REQUIREMENT 0 179 403 2016-01-14T09:34:55Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=PIR }}" wikitext text/x-wiki {{Glossary Term |Glossary Term=PIR }} c3f0611ed83a7af7b1f1189bda11828d6fd12b02 File:Social Media Monitoring-1.xlsx 6 180 404 2016-01-15T00:10:19Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Template:Property values 10 181 405 2016-01-15T08:11:03Z Eddie 1 Created page with "<noinclude> This is the "Property values" template. It should be called in the following format: <pre> {{Property values }} </pre> Edit the page to see the template text. </no..." wikitext text/x-wiki <noinclude> This is the "Property values" template. It should be called in the following format: <pre> {{Property values }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 6fb30b6309458c8a43d5eb940e52be521356d08b 406 405 2016-01-15T08:11:15Z Eddie 1 wikitext text/x-wiki <noinclude>Use this template to list all the unique values for a given property. For more information, see: [[List the set of unique values for a property]] == Template code == </noinclude><includeonly>{{#arraydefine: vals | {{#ask: [[{{{1|}}}::+]] | mainlabel =- | headers = hide |? {{{1|}}} | limit = 10000 }} | , | print=list, sort=asc, unique }}</includeonly> fe5bafc0a79b28cc0bfc284aa34e36145b693c57 Template:Tip 10 182 407 2016-01-15T08:13:15Z Eddie 1 Created page with "<noinclude> This is the "Tip" template. It should be called in the following format: <pre> {{Tip }} </pre> Edit the page to see the template text. </noinclude><includeonly>{|..." wikitext text/x-wiki <noinclude> This is the "Tip" template. It should be called in the following format: <pre> {{Tip }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 3cbee7f8f2f7e9acb42a31b7fb8e47aec01f3fda 408 407 2016-01-15T08:13:31Z Eddie 1 wikitext text/x-wiki <noinclude> This is the 'Tip' template. It should be called in the following format: <pre> {{Tip |Extension= }} </pre> Edit the page to see the template text. </noinclude><includeonly> {{#if:{{{Extension|}}}| '''Extension:''' {{#arraymap:{{{Extension|}}}|,|y|[[Covers extension::y]]}} }} '''Description:''' [[Category:Tips]] </includeonly> dafd4fc65354ddd884478eb95dcfaa9d8e982062 Template:Set 10 183 409 2016-01-15T08:14:11Z Eddie 1 Created page with "<noinclude> This is the "Set" template. It should be called in the following format: <pre> {{Set }} </pre> Edit the page to see the template text. </noinclude><includeonly>{|..." wikitext text/x-wiki <noinclude> This is the "Set" template. It should be called in the following format: <pre> {{Set }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 48de2f01d6afa6fb79008175062085387bacca1b 410 409 2016-01-15T08:14:23Z Eddie 1 wikitext text/x-wiki {{#set:{{{1}}}|{{{2|}}}}} c5edc2c0e70d1efe883c0a435dfc6ef5dce76e37 Template:Class links 10 145 411 345 2016-01-15T08:18:09Z Eddie 1 wikitext text/x-wiki <noinclude> This is the "Class links" template. It should be called in the following format: <pre> {{Class links }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> 0504f5a5eec900ce74d85e88b8b6e77c32741674 412 411 2016-01-15T08:18:32Z Eddie 1 wikitext text/x-wiki [[Form:{{{1}}}|Form]], [[Template:{{{1}}}|Template]] and [[:Category:{{{1}}}|Category]]. 0fd1c4321df100a64e80a7dc2a9fb20fcfd41ccb Reachback Operations 0 43 413 183 2016-01-15T17:04:53Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] This wiki is intended to address the need for reachback capabilities and support by practitioners. researchers, and students. The purpose is to address several complex areas through an innovative approach between industry, academia and the military. What we hope this lays the groundwork for is demonstrating the vastly different environments in the military and corporate capabilities from the 'public sector's' perspective through but a deep understanding and knowledge of the military and government. For the purpose in this effort we refer to "Reachback Operations", and supporting full spectrum Information Operations (degraded state). We will accomplish this through extensive work in ensuring the ontology alignment along with developing a focused suite of tools and resources to allow adaption by others. To be successful will require a pragmatic and real world view, and understanding of the various differences woven into the core of each. For example a Corporate capability to support military or government reachback needs, it's realized, understood, and accepted use of government attributed computers is often impossible as well undesirable and requires trusted support teams to help facilitate discrete and low intensity mission assurance. On the other hand the military has the capability to assist an academic institution in assistance with their strategic or immediate needs in guidance. The model is based on the National Defense University methodology for creating and managing Communities of Practice and outreach for addressing a similar area of complexity related to socio-cultural (Human Terrain) and proven extremely effective. Subject Matter Experts (SME) will be represented by current military and government, individuals from OccamSec's Special Projects, and education. {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Hot Sheet Requests = = Resource Library = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} c947a0f8ea1a107fc48dec4cfc146c7243b6ebb3 414 413 2016-01-15T17:07:29Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Hot Sheet Requests = = Resource Library = = Dominant Drivers = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 456396fa7b2fef3c2d75c22ae80372f122e81555 415 414 2016-01-15T17:07:56Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Hot Sheet Requests = = Resource Library = = Dominant Drivers = This wiki is intended to address the need for reachback capabilities and support by practitioners. researchers, and students. The purpose is to address several complex areas through an innovative approach between industry, academia and the military. What we hope this lays the groundwork for is demonstrating the vastly different environments in the military and corporate capabilities from the 'public sector's' perspective through but a deep understanding and knowledge of the military and government. For the purpose in this effort we refer to "Reachback Operations", and supporting full spectrum Information Operations (degraded state). We will accomplish this through extensive work in ensuring the ontology alignment along with developing a focused suite of tools and resources to allow adaption by others. To be successful will require a pragmatic and real world view, and understanding of the various differences woven into the core of each. For example a Corporate capability to support military or government reachback needs, it's realized, understood, and accepted use of government attributed computers is often impossible as well undesirable and requires trusted support teams to help facilitate discrete and low intensity mission assurance. On the other hand the military has the capability to assist an academic institution in assistance with their strategic or immediate needs in guidance. The model is based on the National Defense University methodology for creating and managing Communities of Practice and outreach for addressing a similar area of complexity related to socio-cultural (Human Terrain) and proven extremely effective. Subject Matter Experts (SME) will be represented by current military and government, individuals from OccamSec's Special Projects, and education. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} a6fe4c23b2ca319a1589a97eb74f048dc6ffc952 416 415 2016-01-15T17:10:58Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Resource Library = = Dominant Drivers = This wiki is intended to address the need for reachback capabilities and support by practitioners. researchers, and students. The purpose is to address several complex areas through an innovative approach between industry, academia and the military. What we hope this lays the groundwork for is demonstrating the vastly different environments in the military and corporate capabilities from the 'public sector's' perspective through but a deep understanding and knowledge of the military and government. For the purpose in this effort we refer to "Reachback Operations", and supporting full spectrum Information Operations (degraded state). We will accomplish this through extensive work in ensuring the ontology alignment along with developing a focused suite of tools and resources to allow adaption by others. To be successful will require a pragmatic and real world view, and understanding of the various differences woven into the core of each. For example a Corporate capability to support military or government reachback needs, it's realized, understood, and accepted use of government attributed computers is often impossible as well undesirable and requires trusted support teams to help facilitate discrete and low intensity mission assurance. On the other hand the military has the capability to assist an academic institution in assistance with their strategic or immediate needs in guidance. The model is based on the National Defense University methodology for creating and managing Communities of Practice and outreach for addressing a similar area of complexity related to socio-cultural (Human Terrain) and proven extremely effective. Subject Matter Experts (SME) will be represented by current military and government, individuals from OccamSec's Special Projects, and education. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 35e78b0770ac50c33a7d006721fd66ccfcd315e9 417 416 2016-01-15T17:21:10Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need by Academia in assisting with ensuring the the information. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} e03a829c5f5a85c465c32035b8a4ff0599c68e7a 421 417 2016-01-15T17:46:53Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Problems == [[Form:Problem]] = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need by Academia in assisting with ensuring the the information. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} 7f62d5b091f6278d83cfda8515b7d1c7a2eeb455 422 421 2016-01-15T17:47:57Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Problems = [[Form:Problem| Pose Problem]] = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need by Academia in assisting with ensuring the the information. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} b604b5497b3786e74b26aa147d4e93aa47642fdd 423 422 2016-01-15T17:50:27Z Eddie 1 /* Problems */ wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Pose Problems = [[Form:Problem| Pose Problem]] = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need by Academia in assisting with ensuring the the information. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Target-icon.png}} {{#set:Full_Title=Reachback Operations Supporting Cyber and the Information Environment}} e432722f47d4cd02ce37b300a4a3b919cbf4901f 424 423 2016-01-16T19:59:03Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = = Pose Problems = [[Form:Problem| Pose Problem]] = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need by Academia in assisting with ensuring the the information. <headertabs /> 21f42588787dfbc164d0ca0ac84be379a9065811 425 424 2016-02-10T12:38:07Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:Multiple Feeds.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">Subject Areas </div> |} |} = Areas of Interest = = Current Efforts = * Research: Evaluation and assessment of threat related services available. Objective: Provide an online source for accessing industry offerings. Approach: The resources selected on unique capability or services for engagment. Tactic: Provide capability composable services, solutions and expertise built for purpose. Technique: Create a suite of selection options developed for ad hoc or support taskings. -Allows configuring for what is needed when needed where needed and how needed. = Pose Problems = [[Form:Problem| Pose Problem]] = Resource Library = = Dominant Drivers = * Current need by the US and NATO to identify and engage with resources for supporting overall capabilities outside normal bounds they operate either from the inability to requirement in cover and attribution protection * Current need by the US Air Force in the area of Targeting which identified Outreach and Distributed Systems (Chapter 3) * Current need in corporate capabilities in operational support and access to the various government groups through consultation in assistance with ensuring the right contacts for the specific situation. <headertabs /> a58093710750fdbb10c600d36917038604d3bd5c Template:Problem 10 184 418 2016-01-15T17:30:29Z Eddie 1 Created page with "<noinclude> This is the "Problem" template. It should be called in the following format: <pre> {{Problem |Level of Concern= |Problem Statement= |Idea Proposed= |Risks= }} </pr..." wikitext text/x-wiki <noinclude> This is the "Problem" template. It should be called in the following format: <pre> {{Problem |Level of Concern= |Problem Statement= |Idea Proposed= |Risks= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Level of Concern | {{{Level of Concern|}}} |- ! Problem Statement | {{{Problem Statement|}}} |- ! Idea Proposed | {{{Idea Proposed|}}} |- ! Risks | {{{Risks|}}} |} [[Category:Problems]] </includeonly> 5293da48a4013e121f7f0815e7ae28f6b5068bef Form:Problem 106 185 419 2016-01-15T17:35:29Z Eddie 1 Created page with "<noinclude> This is the "Problem" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit..." wikitext text/x-wiki <noinclude> This is the "Problem" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Problem}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Problem}}} {| class="formtable" ! Level of Concern: | {{{field|Level of Concern|input type=dropdown|mandatory|property=Level of Concern}}} |- ! Problem Statement: | {{{field|Problem Statement|mandatory|property=Problem Statement}}} |- ! Idea Proposed: | {{{field|Idea Proposed|property=Idea Proposed}}} |- ! Risks: | {{{field|Risks|input type=textarea|property=Risks}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> d6e0cf961df4b7626c81199a602fa0eaaf953870 420 419 2016-01-15T17:44:15Z Eddie 1 wikitext text/x-wiki <noinclude> This is the 'Problem form to generate the ability for discussion or provide solutions or expert knowledge to help. These problems should be encouraged for using in 'feel free in creating' and for generating group input and perspective. Often this leads to more than one area or issue being identified which otherwise would never have been. {{#forminput:form=Problem}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Problem}}} {| class="formtable" ! Level of Concern: | {{{field|Level of Concern|input type=dropdown|mandatory|property=Level of Concern}}} |- ! Problem Statement: | {{{field|Problem Statement|mandatory|property=Problem Statement}}} |- ! Idea Proposed: | {{{field|Idea Proposed|property=Idea Proposed}}} |- ! Risks: | {{{field|Risks|input type=textarea|property=Risks}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 973a71b583f88aecfc1be10ebfb24c75a3cc4c5e MediaWiki:Mainpage 8 42 426 60 2016-02-11T18:08:58Z Eddie 1 wikitext text/x-wiki Knowledge Center fc910ab57b24435649651187ab4b7fabff97d650 Template:Manual 10 186 427 2016-02-11T18:19:49Z Eddie 1 Created page with "<noinclude> This is the "Manual" template. It should be called in the following format: <pre> {{Manual }} </pre> Edit the page to see the template text. </noinclude><includeon..." wikitext text/x-wiki <noinclude> This is the "Manual" template. It should be called in the following format: <pre> {{Manual }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> f78c87e380595d262a1fc9ac00435dee5f67a87d 428 427 2016-02-11T18:20:26Z Eddie 1 wikitext text/x-wiki <includeonly> [[Category:Manuals]] = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} = Cited by pages = {{ #ask: [[Main:+]] ([[Doctrine::{{PAGENAME}}]] OR [[Source::{{PAGENAME}}]] OR [[references::{{PAGENAME}}]]) | format=table }} = Image Gallery = {{ #ask: [[Image:+]] [[Source::{{PAGENAME}}]] | format=list }} <headertabs/> __NOEDITSECTION__ </includeonly> [[Category:Page]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} 327fe583727498830d46bf34de168262626f019c 429 428 2016-02-11T18:20:54Z Eddie 1 wikitext text/x-wiki <includeonly> [[Category:Manuals]] = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} = Cited by pages = {{ #ask: [[Main:+]] ([[Doctrine::{{PAGENAME}}]] OR [[Source::{{PAGENAME}}]] OR [[references::{{PAGENAME}}]]) | format=table }} = Image Gallery = {{ #ask: [[Image:+]] [[Source::{{PAGENAME}}]] | format=list }} <headertabs/> __NOEDITSECTION__ </includeonly> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} 6b61e0b462c0ce8b4062a209b10ecada46b181dd Form:Manual 106 187 430 2016-02-11T18:22:44Z Eddie 1 Created page with "<noinclude> This is the "Manual" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit..." wikitext text/x-wiki <noinclude> This is the "Manual" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Manual}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Manual}}} {| class="formtable" ! Fm: | {{{field|fm}}} |- ! Description: | {{{field|description}}} |- ! Img: | {{{field|img}}} |- ! Title: | {{{field|title}}} |- ! Series: | {{{field|series}}} |- ! Pubdate: | {{{field|pubdate}}} |- ! Url: | {{{field|url}}} |- ! Epub: | {{{field|epub}}} |- ! Kindle: | {{{field|kindle}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 8a59cd2fc8c35628392dc68324dc5a430bbe90d2 Knowledge Management Operations 0 188 431 2016-02-11T18:23:57Z Eddie 1 Created page with "{{Manual}}" wikitext text/x-wiki {{Manual}} 039e99faf4648cc778d8e0f48ee0463b0f756d28 432 431 2016-02-11T18:24:29Z Eddie 1 wikitext text/x-wiki {{Field Manual |img=Fm-6-01-1.png |description=KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show = knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow = collaboration toward innovation which sparks new knowledge. What individuals and small elements know that could help others cannot be widely shared without the means to share it. The sheer volume of available information makes it difficult to identify and use that which is relevant. Knowledge management provides the means to efficiently share knowledge, thus enabling shared understanding and learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge and information between authorized people. It seeks to align people, processes, and tools—to include information technology—within the organization to continuously capture, maintain, and re-use key information and lessons learned to help units learn and adapt and improve mission performance. KM enhances an organization’s ability to detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration is the key contributor to KM, it is imperative that everyone be involved in the process, from the generating force that trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day in every circumstance or location. |fm=6-01.1 |url= |title=Knowledge Management Operations |pubdate=2012 }} 94021b283743343c4682ec12ba876900c23131ba 435 432 2016-02-11T18:27:33Z Eddie 1 wikitext text/x-wiki {{Manual |img=Fm-6-01-1.png |description=KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show = knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow = collaboration toward innovation which sparks new knowledge. What individuals and small elements know that could help others cannot be widely shared without the means to share it. The sheer volume of available information makes it difficult to identify and use that which is relevant. Knowledge management provides the means to efficiently share knowledge, thus enabling shared understanding and learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge and information between authorized people. It seeks to align people, processes, and tools—to include information technology—within the organization to continuously capture, maintain, and re-use key information and lessons learned to help units learn and adapt and improve mission performance. KM enhances an organization’s ability to detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration is the key contributor to KM, it is imperative that everyone be involved in the process, from the generating force that trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day in every circumstance or location. |fm=6-01.1 |url= |title=Knowledge Management Operations |pubdate=2012 }} 759eb8fd8559ad2caeedebebfca45f74088bd4fd 439 435 2016-02-11T18:30:15Z Eddie 1 wikitext text/x-wiki {{Manual |fm=6-01.1 |description=KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show =knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow =collaboration toward innovation which sparks new knowledge.What individuals and small elements know that could help others cannot be widely shared without the means toshare it. The sheer volume of available information makes it difficult to identify and use that which is relevant.Knowledge management provides the means to efficiently share knowledge, thus enabling shared understandingand learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge andinformation between authorized people. It seeks to align people, processes, and tools—to include informationtechnology—within the organization to continuously capture, maintain, and re-use key information and lessonslearned to help units learn and adapt and improve mission performance. KM enhances an organization’s abilityto detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration isthe key contributor to KM, it is imperative that everyone be involved in the process, from the generating forcethat trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day inevery circumstance or location. |img=Fm-6-01-1.png |title=Knowledge Management Operations |pubdate=2012 |url=http://www.reachback.io/wiki/images/b/b4/Fm6-01-1.pdf }} 79a1c713e46552b274c2b697d464ff4db26005cf Template:Field Manual 10 189 433 2016-02-11T18:25:13Z Eddie 1 Created page with "<includeonly> [[Category:Manuals]] = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom:..." wikitext text/x-wiki <includeonly> [[Category:Manuals]] = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} = Cited by pages = {{ #ask: [[Main:+]] ([[Doctrine::{{PAGENAME}}]] OR [[Source::{{PAGENAME}}]] OR [[references::{{PAGENAME}}]]) | format=table }} = Image Gallery = {{ #ask: [[Image:+]] [[Source::{{PAGENAME}}]] | format=list }} <headertabs/> __NOEDITSECTION__ </includeonly> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} 6b61e0b462c0ce8b4062a209b10ecada46b181dd File:Fm-6-01-1.png 6 190 434 2016-02-11T18:26:03Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Property:Manual 102 191 436 2016-02-11T18:28:09Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. It links to pages that use the form [[Has default form::Manual]]. 89541aa90d278b64dcdd6e17e94157e618d069f8 Category:Manuals 14 192 437 2016-02-11T18:28:46Z Eddie 1 Created page with "{{#default_form:Manual}}" wikitext text/x-wiki {{#default_form:Manual}} 4b140fb8fac77b69cae89214bd5d14940d7b7c1c File:Fm6-01-1.pdf 6 193 438 2016-02-11T18:29:49Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Property:FM 102 194 440 2016-02-11T18:30:40Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Pubdate 102 195 441 2016-02-11T18:30:58Z Eddie 1 Created a property of type [[Has type::Date]] wikitext text/x-wiki This is a property of type [[Has type::Date]]. 5263c8921631f25051f416df19a72490a588561e Property:Title 102 196 442 2016-02-11T18:31:30Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Publication Date 102 197 443 2016-02-11T18:32:20Z Eddie 1 Created a property of type [[Has type::Date]] wikitext text/x-wiki This is a property of type [[Has type::Date]]. 5263c8921631f25051f416df19a72490a588561e Knowledge Management Operations 0 188 444 439 2016-02-11T18:33:42Z Eddie 1 Eddie moved page [[FM 6-01.1]] to [[Knowledge Management Operations]] wikitext text/x-wiki {{Manual |fm=6-01.1 |description=KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show =knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow =collaboration toward innovation which sparks new knowledge.What individuals and small elements know that could help others cannot be widely shared without the means toshare it. The sheer volume of available information makes it difficult to identify and use that which is relevant.Knowledge management provides the means to efficiently share knowledge, thus enabling shared understandingand learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge andinformation between authorized people. It seeks to align people, processes, and tools—to include informationtechnology—within the organization to continuously capture, maintain, and re-use key information and lessonslearned to help units learn and adapt and improve mission performance. KM enhances an organization’s abilityto detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration isthe key contributor to KM, it is imperative that everyone be involved in the process, from the generating forcethat trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day inevery circumstance or location. |img=Fm-6-01-1.png |title=Knowledge Management Operations |pubdate=2012 |url=http://www.reachback.io/wiki/images/b/b4/Fm6-01-1.pdf }} 79a1c713e46552b274c2b697d464ff4db26005cf 479 444 2016-02-14T18:54:25Z Eddie 1 wikitext text/x-wiki {{Manual |fm=6-01.1 |description=KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show =knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow =collaboration toward innovation which sparks new knowledge.What individuals and small elements know that could help others cannot be widely shared without the means toshare it. The sheer volume of available information makes it difficult to identify and use that which is relevant.Knowledge management provides the means to efficiently share knowledge, thus enabling shared understandingand learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge andinformation between authorized people. It seeks to align people, processes, and tools—to include informationtechnology—within the organization to continuously capture, maintain, and re-use key information and lessonslearned to help units learn and adapt and improve mission performance. KM enhances an organization’s abilityto detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration isthe key contributor to KM, it is imperative that everyone be involved in the process, from the generating forcethat trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day inevery circumstance or location. |img=Fm-6-01-1.png |title=Knowledge Management Operations |pubdate=2012 |url=http://www.reachback.io/wiki/images/b/b4/Fm6-01-1.pdf }} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=KMO.png}} 1572c5e1bbfc3600d20077ecde2b5a52f9d2d300 FM 6-01.1 0 198 445 2016-02-11T18:33:43Z Eddie 1 Eddie moved page [[FM 6-01.1]] to [[Knowledge Management Operations]] wikitext text/x-wiki #REDIRECT [[Knowledge Management Operations]] 298808a67755a5a246948bc05129721b35299b43 Template:Character 10 199 446 2016-02-12T05:33:39Z Eddie 1 Created page with "<noinclude> This is the "Character" template. It should be called in the following format: <pre> {{Character }} </pre> Edit the page to see the template text. </noinclude><inc..." wikitext text/x-wiki <noinclude> This is the "Character" template. It should be called in the following format: <pre> {{Character }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> cb4b2bccec1de22895941d3fedc19b8001e6e2c1 Knowledge Center 0 200 447 2016-02-14T17:53:29Z Eddie 1 Created page with "__NOEDITSECTION__ [[File:Targetfolder-red.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; c..." wikitext text/x-wiki __NOEDITSECTION__ [[File:Targetfolder-red.png|left|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 54a1693c35aac0260881331005871d8708459e03 448 447 2016-02-14T18:02:44Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|center|frameless|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 02b7a5e937beb17e3074371ed215916ffd3972f5 450 448 2016-02-14T18:04:57Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 30312401ab38f7036f779c9edfeb6a19d4159a09 451 450 2016-02-14T18:06:04Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 1d66480c6dff31264ce906260e0e330ac989f043 452 451 2016-02-14T18:09:47Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = = Public Sector = = Private Sector = = Programs = Resources = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 3764b1aa90ae27a7fff329c19a11a09196b05935 453 452 2016-02-14T18:10:19Z Eddie 1 /* Private Sector */ wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = = Public Sector = = Private Sector = = Programs = = Resources = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 7d0dc4d5656e836f9c477272bdd222112e0badfe 454 453 2016-02-14T18:12:14Z Eddie 1 /* Programs */ wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = = Public Sector = = Private Sector = = Engineering = = Resources = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 474a0ed2fa3a84f6617bb37b1a33b02047a933e9 455 454 2016-02-14T18:15:07Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = = Resources = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} bac81ad598a38be17dcfaf1437f8f661c5d6a155 458 455 2016-02-14T18:19:21Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = {{KMO}} = Resources = <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 3bffb581ade957bd1a904ed42c876928a2297d8f 459 458 2016-02-14T18:20:09Z Eddie 1 /* Resources */ wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = {{KMO}} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} ecad1280eb2ba3e25484c48eb7a0ccf85fd4a098 462 459 2016-02-14T18:22:54Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{KMO}} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} cdb1984559832a130acf54ef98ee520b2a5c883d 466 462 2016-02-14T18:30:32Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 3c5a174c483aeb8b5168bd31a08b816cdbfcf784 File:World-Banner.png 6 201 449 2016-02-14T18:04:02Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Template:KMO 10 202 456 2016-02-14T18:17:23Z Eddie 1 Created page with "<noinclude> This is the "KMO" template. It should be called in the following format: <pre> {{KMO }} </pre> Edit the page to see the template text. </noinclude><includeonly>{|..." wikitext text/x-wiki <noinclude> This is the "KMO" template. It should be called in the following format: <pre> {{KMO }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> e725d22d38ccfd2bfbdb80c3251f560dc03f83ec 457 456 2016-02-14T18:18:41Z Eddie 1 wikitext text/x-wiki <includeonly> = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} <headertabs/> __NOEDITSECTION__ </includeonly> b3bb121f83eb331a87007815df215f85bdac65e2 460 457 2016-02-14T18:21:13Z Eddie 1 wikitext text/x-wiki <includeonly> = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} = Cited by pages = {{ #ask: [[Main:+]] ([[Doctrine::{{PAGENAME}}]] OR [[Source::{{PAGENAME}}]] OR [[references::{{PAGENAME}}]]) | format=table }} = Image Gallery = {{ #ask: [[Image:+]] [[Source::{{PAGENAME}}]] | format=list }} <headertabs/> __NOEDITSECTION__ </includeonly> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} bb6fb7c401457c076269135837ded6d1d7eb4032 463 460 2016-02-14T18:26:11Z Eddie 1 wikitext text/x-wiki KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show = knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow = collaboration toward innovation which sparks new knowledge. [{New paragraph}} What individuals and small elements know that could help others cannot be widely shared without the means to share it. The sheer volume of available information makes it difficult to identify and use that which is relevant. Knowledge management provides the means to efficiently share knowledge, thus enabling shared understanding and learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge and information between authorized people. It seeks to align people, processes, and tools—to include information technology—within the organization to continuously capture, maintain, and re-use key information and lessons learned to help units learn and adapt and improve mission performance. KM enhances an organization’s ability to detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration is the key contributor to KM, it is imperative that everyone be involved in the process, from the generating force that trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day in every circumstance or location. {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- |}'' __NOEDITSECTION__ {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} e713ef34c41c5af239385dce298146b23a389e97 464 463 2016-02-14T18:27:13Z Eddie 1 wikitext text/x-wiki {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- |}'' KM can be summarized in the phrase “Know, Show, Grow!” Know = tacit “head knowledge”; Show = knowledge that is written down and documented (explicit knowledge) to be shared with others; Grow = collaboration toward innovation which sparks new knowledge. [{New paragraph}} What individuals and small elements know that could help others cannot be widely shared without the means to share it. The sheer volume of available information makes it difficult to identify and use that which is relevant. Knowledge management provides the means to efficiently share knowledge, thus enabling shared understanding and learning within organizations. To do this, KM creates, organizes, applies, and transfers knowledge and information between authorized people. It seeks to align people, processes, and tools—to include information technology—within the organization to continuously capture, maintain, and re-use key information and lessons learned to help units learn and adapt and improve mission performance. KM enhances an organization’s ability to detect and remove obstacles to knowledge flow, thereby fostering mission success. Because collaboration is the key contributor to KM, it is imperative that everyone be involved in the process, from the generating force that trains and sustains the Soldier to the operating force, which ensures Soldiers survive and thrive every day in every circumstance or location. __NOEDITSECTION__ {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Document info.png}} 7a79fc60343c8efcf10aa4f4f5914937040d6fa5 Form:KMO 106 203 461 2016-02-14T18:22:14Z Eddie 1 Created page with "<noinclude> This is the "KMO" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit tha..." wikitext text/x-wiki <noinclude> This is the "KMO" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=KMO}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|KMO}}} {| class="formtable" ! Fm: | {{{field|fm}}} |- ! Description: | {{{field|description}}} |- ! Img: | {{{field|img}}} |- ! Title: | {{{field|title}}} |- ! Series: | {{{field|series}}} |- ! Pubdate: | {{{field|pubdate}}} |- ! Url: | {{{field|url}}} |- ! Epub: | {{{field|epub}}} |- ! Kindle: | {{{field|kindle}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 622b32ff2e9ee3726ee768be0d38590d22ec15dd File:Fm-6-01-1.png 6 190 465 434 2016-02-14T18:28:38Z Eddie 1 Eddie uploaded a new version of [[File:Fm-6-01-1.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Types of Knowledge 0 204 467 2016-02-14T18:36:08Z Eddie 1 Created page with "'''Tacit knowledge''' resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained fro..." wikitext text/x-wiki '''Tacit knowledge''' resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. {{New paragraph}} '''Explicit knowledge''' consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decisionmaking. Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:KMO Pages]]__NOEDITSECTION__ __NOTOC__ 88856d0e48f93c06ee66a841f784c16e11089370 468 467 2016-02-14T18:37:12Z Eddie 1 wikitext text/x-wiki '''Tacit knowledge''' resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. {{New Paragraph}} '''Explicit knowledge''' consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decisionmaking. Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:KMO Pages]]__NOEDITSECTION__ __NOTOC__ fa9d1b8f234fce1bb09356388051847f2a39e2da 475 468 2016-02-14T18:47:18Z Eddie 1 wikitext text/x-wiki '''TACIT KNOWLEDGE''' <br /> Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. {{New Paragraph}} '''EXPLICIT KNOWLEDGE''' <br /> Explicit knowledge consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decisionmaking. Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:KMO Pages]]__NOEDITSECTION__ __NOTOC__ b4adae68ae597e6bdfb71cbe79338cdf8eebbcc6 TACIT KNOWLEDGE 0 205 469 2016-02-14T18:38:55Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=TACIT KNOWLEDGE |Glossary Definition=Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All ind..." wikitext text/x-wiki {{Glossary Term |Glossary Term=TACIT KNOWLEDGE |Glossary Definition=Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. }} 69b96ed3259a1ece039354d87e67301ac0d0695f 470 469 2016-02-14T18:39:42Z Eddie 1 wikitext text/x-wiki {{Glossary Term |Glossary Term=TACIT KNOWLEDGE : |- |Glossary Definition=Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. }} eab4337d28e462356b7baa3594d58407198c8c97 471 470 2016-02-14T18:40:20Z Eddie 1 Eddie moved page [[Tacit knowledge]] to [[TACIT KNOWLEDGE]] without leaving a redirect wikitext text/x-wiki {{Glossary Term |Glossary Term=TACIT KNOWLEDGE : |- |Glossary Definition=Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. }} eab4337d28e462356b7baa3594d58407198c8c97 EXPLICIT KNOWLEDGE 0 206 472 2016-02-14T18:41:59Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=EXPLICIT KNOWLEDGE |Glossary Definition=Explicit knowledge consists of written or otherwise documented information that can be organized, applie..." wikitext text/x-wiki {{Glossary Term |Glossary Term=EXPLICIT KNOWLEDGE |Glossary Definition=Explicit knowledge consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decision making. }} 2ee873b43afa81aebdfc770284f8cd838e8f3db1 473 472 2016-02-14T18:42:19Z Eddie 1 wikitext text/x-wiki {{Glossary Term |Glossary Term=EXPLICIT KNOWLEDGE : |- |Glossary Definition=Explicit knowledge consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decision making. }} 41f8005b8e6eb4f30c3300cc4da90f0df19beeeb Property:Knowledge type 102 207 474 2016-02-14T18:43:35Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. The allowed values for this property are: * [[Allows value::Explicit]] * [[Allows value::Tacit]] d7ed289f6a1fcfe259fd71b6a2b83773e2690b0e File:Document info.png 6 208 476 2016-02-14T18:51:53Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Template:Glossary Term 10 176 477 401 2016-02-14T18:52:48Z Eddie 1 wikitext text/x-wiki <noinclude></noinclude><includeonly>{{#set: |Glossary-Term={{{Glossary Term|}}} |- |Glossary-Definition={{{Glossary Definition|}}} |template=SetParserValue }} [[Category:Glossary Term]]</includeonly><br /> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Info-icon.png}} c877d0fd0588af8a0487324ea80b326d069672af File:KMO.png 6 209 478 2016-02-14T18:53:29Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 MediaWiki:Gadgets-definition 8 210 480 2016-02-14T18:59:33Z Eddie 1 Created page with "== interface-gadgets == * site[ResourceLoader|default|top|dependencies=mediawiki.legacy.wikibits,mediawiki.util,jquery.mwExtension,ext.gadget.enwp-boxes]|site.js|site.css|NavF..." wikitext text/x-wiki == interface-gadgets == * site[ResourceLoader|default|top|dependencies=mediawiki.legacy.wikibits,mediawiki.util,jquery.mwExtension,ext.gadget.enwp-boxes]|site.js|site.css|NavFrame.js|NavFrame.css * enwp-boxes[ResourceLoader|default|top]|enwp-boxes.css * collapsibleTables[ResourceLoader|default]|collapsibleTables.js * Edittop[ResourceLoader]|edittop.js * UTCLiveClock[ResourceLoader]|UTCLiveClock.js * rtrc[ResourceLoader]|rtrc.css|rtrc.js * ajaxrecentchanges[ResourceLoader|dependencies=jquery.spinner]|ajaxrecentchanges.js * Navigation_popups[ResourceLoader]|popups.js|navpop.css * CodeReview_checkedRevsExport[ResourceLoader]|CodeReview_checkedRevsExport.js * contribsrange[ResourceLoader]|contribsrange.js * Numerakri[ResourceLoader|dependencies=jquery.cookie, mediawiki.util, mediawiki.user, mediawiki.RegExp]|Numerakri.css|Numerakri.js * externalsearch[ResourceLoader]|externalsearch.js * externalsearch-bar[ResourceLoader]|externalsearch-bar.js * vector-headanchor[ResourceLoader]|vector-headanchor.js|vector-headanchor.css * BugStatusUpdate[ResourceLoader]|BugStatusUpdate.js * purgetab[ResourceLoader|dependencies=mediawiki.util]|purgetab.js * Coloredlinks|Coloredlinks.css * autolink[ResourceLoader]|autolink.js * predefined-summaries[ResourceLoader|dependencies=mediawiki.util]|predefined-summaries.js == editing-gadgets == * DotsSyntaxHighlighter[ResourceLoader|dependencies=jquery.client]|DotsSyntaxHighlighter.js * Edittools[ResourceLoader|default]|Edittools.js * HotCat[ResourceLoader]|HotCat.js * TabOverride[ResourceLoader]|TabOverride.js * oldeditor[ResourceLoader]|oldeditor.js * workinprogress[ResourceLoader]|workinprogress.js * userMessages[ResourceLoader]|userMessages.js == AuthorizedUsers == * CleanDeleteReasons[ResourceLoader]|CleanDeleteReasons.js * blocktab[ResourceLoader|dependencies=mediawiki.util,mediawiki.Title]|blocktab.js * botRollback[ResourceLoader]|botRollback.js b2a7d5bf3bd396f8b16725eaa525198548ff6f69 Category:KMO Pages 14 211 481 2016-02-14T19:07:19Z Eddie 1 Created page with "__HIDDENCAT__" wikitext text/x-wiki __HIDDENCAT__ 183b9c38bff80327776bd180634fccfd19cf616f Gestalt Wiki Framework 0 212 483 482 2016-02-14T19:09:51Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-8 columns">The '''[[Contact|Gestalt Wiki Framework]]''' (GWF) is a set of patterns and open source software that enables groups to build enterprise knowledge using structured wikis. This is our showcase for both ''enterprise knowledge stewards'' who are interested in wiki-based knowledge management and ''wiki builders'' who want to learn how to use GWF extensions. {{New Paragraph}} Enterprise knowledge stewards may want to read more about the [[Background |background]] of the evolution and use of GWF in the enterprise as well as [[Enterprise Collaboration |enterprise collaboration with wikis]] and how enterprise content becomes a [[Content Networks|content network]]. Wiki-based enterprise knowledge management using GWF involves authors contributing content using forms. These contributions may be combined with enterprise data, queried, and visualized. Visualizations include automatically computed tables, tag clouds, bar charts, pie charts, time lines, calendars, and network graphs to enable readers to see the "big picture" of enterprise community knowledge. GWF allows authors to contribute content once and use that content in many ways. The name "Gestalt" was chosen to reflect the evolving "big picture" of enterprise knowledge as communities collaboratively create, combine, and use their collective contributions towards a greater purpose. {{New Paragraph}} Wiki builders may be interested in jumping ahead to the [[Gestalt Wiki Framework Extensions|extensions documentation section]]. As a showcase for GWF extensions, we used many extension features throughout the site. For example, the green asterisk logo next to the title of this page is an example of the [[Title Icon]] extension.The information contained in the Table of Contents on the right is used in the green breadcrumb bar at the top of this page to help users navigate pages sequentially. Both the Table of Contents and the breadcrumbs are features provided by the [[Hierarchy Builder]] extension. {{New Paragraph}} Our team has built over 70 unique wikis since 2006. Half of these wikis are currently actively used at MITRE and on customer networks. Enterprise wiki collaboration is different than Wikipedian collaboration. Many enterprises lack 100,000+ volunteer editors with an evolved wiki culture. We have found that in addition to adapting wiki technology to the enterprise, wiki success occurs when a community champion successfully articulates the purpose of a wiki and transforms existing business processes away from the dependency on document-based email collaboration. Read more about [[Enterprise Collaboration|enterprise collaboration]] and how wikis can help. <!-- As shown in the interactive [[Table of Contents]] on the right, this site is organized into three sections. The first section describes the [[Background |background]] of the GWF, as well as two concepts: how [[Enterprise Collaboration |enterprise collaboration]] can be conducted using a wiki and how the structure of the content becomes a [[Content Networks |network]]. The second section documents selected [[Gestalt Wiki Framework Extensions |extensions]] and provides working examples. The third section includes additional information about our [[Publications|publications]], [[Team|team]], [[MITRE|enterprise]], and [[Contact |contact information]].--> </div><div class="large-4 columns" style="font-size:70%;background: white !important;">[[Image:GWFAuthoringMosaic.png|400px]]<br>Gestalt: The whole is greater than the sum of its parts.<br>{{#hierarchySubtree:Table of Contents|Table of Contents|Hierarchy Data|displaynameproperty=Name|showroot}} </div></div> ---- There are [[Special:Statistics|{{NUMBEROFPAGES}}]] pages in this wiki. [[To do]] {{DISPLAYTITLE:Gestalt Wiki Framework}} {{#set:Name={{PAGENAME}}}}__NOTOC__ [[Category:Page]] 09e70b09e205cbb4e8b74ca9972dbc3f8e81c297 Background 0 213 485 484 2016-02-14T19:09:51Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-12 columns">The broad enterprise encyclopedia, MITREpedia, was established in 2004 as a grassroots effort to capture technical enterprise knowledge as linked articles rather than bulleted presentations. The linear nature of slide presentations, however, forces authors to reduce complex subjects to a set of bullet items that are too weak to support decision-making or show the complexity of an issue. Information designer and visualization expert Edward Tufte has argued that bulleted presentations encourages simplistic thinking where ideas are squashed into lists and stories are transformed into a collection of disparate points<ref>See Wikipedia' article about [http://en.wikipedia.org/wiki/Edward_Tufte#Criticism_of_PowerPoint Edward Tufte views on bullet-based presentations]</ref>. {{New Paragraph}} MITREpedia project governance was led by a MITREpedia Users Group consisting of staff content providers and MITREpedia system administrators. As a grassroots volunteer encyclopedia, MITREpedia's structure evolved over time with the development of categories as a by-product of authoring articles. Navigational elements to improve findability included a featured article, recent contributions, categories, and enterprise "fast jumps"-- named enterprise links. Topic-specific "wiki portals," a major findability element for Wikipedia, were not adopted. {{New Paragraph}} The Gestalt Wiki Framework (GWF) effort began as a single Semantic MediaWiki-based wiki about human language technology (HLT) in 2006. The purpose was to produce a dynamic, growing knowledge repository for MITRE's work in HLT to maintain continuous enterprise situational awareness, i.e. "the big picture or "Gestalt" about HLT at MITRE without creating periodic surveys, scheduling meetings, conducting enterprise searches, and analyzing financial project data. Languapedia's sidebar was customized for the HLT community to link to projects, people, events, and HLT topics. </div></div> <div class="row" ><div class="large-4 columns">Librarian staff discovered Languapedia after searching for an approach to develop a highly structured, highly findable biosecurity collection. Biopedia was the second wiki to be constructed. Robopedia, the third wiki, grew at a significantly more rapid pace than Languapedia nor Biopedia. Languapedia was established as an experiment without socialization within the community. Biopedia was developed as part of a diffuse group's needs to establish biosecurity as an important up and coming interest. Robopedia represented the needs of a dedicated group of technologists who depend heavily on technical documentation. It currently contains ~8,800 pages, has ~150 users, and won a MITRE Knowledge Management Award in 2012. Robopedia became the poster wiki for many GWF wikis developed at MITRE as well as GWF wikis developed for MITRE customers. </div><div class="large-8 columns">[[Image:Reuse.png|800px]]<br>Gestalt Wiki Influence Path</div></div> <div class="row" ><div class="large-12 columns">As the team grew from one to seven, we developed best practices for GWF extension development as well as wiki and wiki farm development to help us work across multiple funding sources and customers simultaneously. In 2014, MITREpedia was transitioned to the McLean, VA Gestalt Wiki Framework team. It was upgraded from MediaWiki 1.13 to 1.23 from XML page exports because the MySQL database was so old that the update script failed to run. With MITREpedia's 25,000 pages, we have 60,000 pages on active wikis and 57,000 pages in read-only archive. Our vision is to work towards federating all the Gestalt Wiki Framework wikis with MITREpedia as the entry point for enterprise wiki knowledge and the topic-specific wikis. Learn more about today's [[Gestalt Wiki Framework]]. </div></div> ---- {{RefList}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 0c789e2fdfef1ab499622b1036a62a690a53f052 Enterprise Collaboration 0 214 487 486 2016-02-14T19:09:52Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-8 columns">Traditionally, enterprise knowledge work business processes involve staff creating a document, spreadsheet, or briefing and then emailing it to a group for review. Each time the information container is emailed to an author, an additional copy of the resource is created. Multiple copies of the information container at different stages of the editing process is copied to each author's desktop, email queue, and/or shared folders. To bring all of the modifications into a single instance of the information container, authors need to accept and merge changes. When the group of authors is highly active, it can be very time-consuming to ensure that all changes are correctly considered, accepted, and merged. Searching through large email folders to find the most current version can also be time-consuming. A document management system can improve multi-author editing using a check in and check out process. However, over time, the hierarchical structure of the document management system can become saturated with so many items that authors find it difficult to navigate or find the information containers they need.</div> <div class="large-4 columns">[[Image:NxNAuthoring.png|400px]]<br>Emailing Knowledge Resources</div></div> <div class="row" ><div class="large-8 columns">Collaborating on a common page or set of pages in a wiki can eliminate the version control and findability problems cited above. Instead of emailing or posting the resource to a document management system, authors use a wiki to shape the resource. All edits are logged and authors can inspect the history of the page to learn how the page has changed over time and who were the authors who made the changes. There is no need to merge edits. Merge happens each time an author edits the page. Not only can these authors inspect the page history, they can also make comments or discuss the page. A structured wiki adds support to the authoring process by ensuring that authors edit the latest version and by authors embedding queries to aggregate and filter related knowledge, and display query results as tag clouds, bar charts, network graphs, faceted navigation lists, scatter plots, tree maps, geospatial maps, timelines, calendars, and more. Enterprise wiki champions have redirected their community members from email to make contributions about work in progress or the results of meetings with customers in the community wiki. Over time, these contributions can be aggregated on community member pages, projects pages, or any other related pages where a visualization would be useful. This is possible because structured wikis enable [[Content Networks|content networks]] to be formed and used. </div><div class="large-4 columns">[[Image:GWFAuthoring.png|400px]]<br>Enterprise Wiki Collaboration</div></div> ---- {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 6f02dac07c3304ae6aef7c4d94f0ae991a11539b Content Networks 0 215 489 488 2016-02-14T19:09:52Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-5 columns">Enterprise content is a network of relationships between projects, events, organizations, customers, reviews, events and topics of interest to its staff, partners, and customers. There are many information technologies that can be used to reveal these relationships. This diagram captures the increasing data controls and opportunities to collaborate with more contributors. A {{Elink|http://en.wikipedia.org/wiki/Table_(information)|table}} organizes data into rows and columns. Rows represent an item and columns represent attributes or properties of the item. The intersection of a row and a column is a cell. Cells contain data values. Data controls are limited to sorting actions. A {{Elink|http://en.wikipedia.org/wiki/Spreadsheet|spreadsheet}} is a software application used to analyze data. It consists of a set of tables with enhanced controls such as functions which can modify data values using rules pivot tables which summarize and visualize data. </div><div class="large-7 columns">[[Image:TableCellsToRelationships.png|700px]] <br> Table Cells to Structured Wikis</div></div> <div class="row" ><div class="large-12 columns">{{Elink|http://en.wikipedia.org/wiki/Database|Databases}} use metadata in a schema to structure and organize information as queriable tables. {{Elink|http://en.wikipedia.org/wiki/Document_management_system|Document management systems}} organize documents into hierarchies where text can be searched. A wiki represents information as a collection of linked pages. Pages can be grouped by categories and edit history is logged. A structured wiki enables authors to annotate page text with user-defined properties. These properties define relationships which can be combined and queried to produce many different views of the same information.</div></div> <div class="row" ><div class="large-5 columns">Wikis transform a single page into a network of content. For example, a wiki could contain pages about presentations created at MITRE. A form could be used to enter the information about a presentation such as the soon-to-be famous movie, "Wikis Save MITRE." The movie could be reviewed where the reviewer could rate the movie using stars and include a comment. The movie could also be discussed or commented upon where viewers engage in a dialogue about the movie. The quality of the content about the movie could also be reviewed. Finally, readers could make lists of movies and include this movie. One wiki page about the movie item can become a network of related pages that quality or further describe the movie. In addition, the annotations in the "Wikis Save MITRE" page such as the date, time, length, description, and tags could queried and the results embedded into additional pages about the movie. To make use of iconography to improve comprehension, to visualize content as a network or hierarchy, or to rate content, see [[Gestalt Wiki Framework Extensions]].</div><div class="large-7 columns">[[Image:NetworkofPages.png|700px]]<br>Content Network</div><div> ---- {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] da50b9cad5ce09385ac2942d120ac9c749bdac6b Gestalt Wiki Framework Extensions 0 216 491 490 2016-02-14T19:09:53Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row" ><div class="large-6 columns"> ==== Description ==== The Gestalt Wiki Framework team has written over 40 extensions for MediaWiki and Semantic MediaWiki. Eleven extensions have been contributed to the MediaWiki open source community as shown at the bottom of this page which was transcluded page from [http://www.mediawiki.org/wiki/Category:Extensions_by_MITRE MediaWiki.org]. As our extensions mature, we plan to contribute as many general purpose extensions to the MediaWiki community as funding priorities allow. This section of the wiki provides usage documentation as well as live examples of selected GWF extensions. As shown in the legend, the grey boxes display the wiki text, the blue boxes contain live examples, and the white boxes are links to live examples. Visit our documentation pages: {{#hierarchyChildren:Gestalt Wiki Framework Extensions|Table of Contents|Hierarchy Data|Name|template=X}}</div><div class="large-6 columns">{{Legend}}</div></div> ---- [[Category:Page]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} 04ea82d1f66b2c852f9482fe8f4b9b06913a8c05 Title Icons in Page 0 217 493 492 2016-02-14T19:09:53Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} {{#set:Name={{PAGENAME}}}} [[Category:Page]] 3832b0804d1c7db067791b0abda46d84058398d5 Title Icons in Page and Category 0 218 495 494 2016-02-14T19:09:53Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 2422850acbebabbd542fe5da52d07b9411c48d6d Hide All Title Icons 0 219 497 496 2016-02-14T19:09:54Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=all}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 5d215b43cf5834c8198393b685fe8b7686067ccd Hide Page Title Icons 0 220 499 498 2016-02-14T19:09:54Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=page}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 0f8e3d0de4d9ec150e1db4be3d26bef072fb02c1 Hide Category Title Icon 0 221 501 500 2016-02-14T19:09:54Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} {{#set:Hide Title Icon=category}} {{#set:Title Icon=UnderConstruction.png}} {{#set:Title Icon=Article.png}} {{#set:Title Icon=Inproceedings.png}} [[Category:Title Icon Category]] {{#set:Name={{PAGENAME}}}} [[Category:Page]] 617f488b4cc42ab8c47c3eb09c5e4e72a0468f80 Semantic Rating 0 222 503 502 2016-02-14T19:09:55Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns">The Semantic Rating extension adds a [http://www.mediawiki.org/wiki/Extension:Semantic_Forms Semantic Form] input type to enable users to enter a rating by clicking on stars. It also adds three parser functions to display a star rating by displaying empty (gray), full (yellow), and half stars: * <code>#rating</code> displays a rating inline * <code>#ratingBeforeTitle</code> displays a rating to the left of the title at the top of the page. * <code>#ratingAfterTitle</code> displays a rating to the right of the title at the top of the page. __TOC__</div><div class="large-6 columns">{{Legend}}</div></div> ====Usage: Define a Semantic Form Rating Field==== The following will add an input field with the default maximum number of stars: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{{field|Rating|input type=rating}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example [[Special:FormEdit/Review/Review:1/Bclemente |An example Review Form]], See form here: [[Form:Review]] |} </div></div> The maximum number of stars can be set explicitly with the '''max''' parameter: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{{field|Rating|input type=rating|max=10}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" |See working example in action ????See form here: ???? |}</div></div> {{New Paragraph}} ====Usage: Display a Number as a Five Star Rating==== The following displays a number as a five star rating. <div class="row" width=100% ><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:75%;"> <pre> {{#rating:0}}<br> {{#rating:0.5}}<br> {{#rating:1}}<br> {{#rating:1.5}}<br> {{#rating:2}}<br> {{#rating:2.5}}<br> {{#rating:3}}<br> {{#rating:3.5}}<br> {{#rating:4}}<br> {{#rating:4.5}}<br> {{#rating:5}}<br> {{#rating:}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:0}}<br> {{#rating:0.5}}<br> {{#rating:1}}<br> {{#rating:1.5}}<br> {{#rating:2}}<br> {{#rating:2.5}}<br> {{#rating:3}}<br> {{#rating:3.5}}<br> {{#rating:4}}<br> {{#rating:4.5}}<br> {{#rating:5}}<br> {{#rating:}} |}</div></div> {{New Paragraph}} ====Usage: Display a Rating with Maximum Number of Stars==== To explicitly set the maximum number of stars to 10, use the following: <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#rating:3|10}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:3|10}} |} </div></div> {{New Paragraph}} ====Usage: Display an Average Rating==== The following query displays the rating using the Semantic Result Format ''average''. <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#rating:{{#ask:[[Category:Reviews]][[Item::Item:1]]|?Rating|format=average}}}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:{{#ask:[[Category:Reviews]][[Item::Item:1]]|?Rating|format=average}}}} |} </div></div> {{New Paragraph}} ====Usage: Display Review Results as an Average Rating==== This query displays the average rating for each item. <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ask:[[Category:Items]] |?Responsive Citation |headers=hide |mainlabel=- |format=table |class=border |limit=5 |sort=Sorting Title |order=ascending | searchlabel= }} </pre></div><div class="large-7 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;font-size:90%" |{{#ask:[[Category:Items]] |?Responsive Citation |headers=hide |mainlabel=- |format=table |class=border |limit=5 |sort=Sorting Title |order=ascending | searchlabel= }} |}</div></div> {{New Paragraph}} ====Usage: Rating Before Title==== To explicitly set the number of stars to be displayed ''before'' the page title, use <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ratingBeforeTitle:5}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example on this page: [[Rating Before Title]] |} </div></div> {{New Paragraph}} ====Usage: Rating After Title==== To explicitly set the number of stars to be displayed ''after'' the page title, use <div class="row" width=100%><div class="large-4 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre> {{#ratingAfterTitle:3}} </pre></div><div class="large-7 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;" | See working example on this page: [[Rating After Title]] |} </div></div> {{Download|http://www.mediawiki.org/wiki/Extension:Semantic Rating}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 8d130498264bbc007c7cb981c773f442722b1d22 VIKI Network Graph 0 223 505 504 2016-02-14T19:09:55Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row" style="background:white;" width=100%><div class="large-5 columns" > '''VIKI''' (Visualization and Knowledge Integration) is an extension that displays the structure of wiki content as the inbound, outbound, and second order links for a list of wiki pages. It was implemented using D3 as a directed force layout graph visualization. In a VIKI graph, graph nodes represent individual wiki pages or web pages, while links between nodes indicate page links (i.e. one page has a hyperlink to another page, e.g. of the form <nowiki>[[Page Link]]</nowiki>). These links are directional, where the direction of the link indicates which page links to which. If two pages link to each other, the link is bidirectional. Two pages are linked on a VIKI graph if there is a link between their nodes on the graph, i.e. either of the two pages links to the other, or they link to each other. Some wiki pages also have hyperlinks to external web pages; these pages are also displayed on the VIKI graph (with a generic wi-fi icon), but interaction with these pages is limited. {{New Paragraph}} The graph is pannable and zoomable using either the mouse scroll action or the zoom bar located at the bottom of the graph. Individual nodes may be dragged around and rearranged as well; the D3 graph automatically revises node positions to a local equilibrium state whenever nodes are dragged. </div><div class="large-7 columns" style="border: solid 1px #E8E8E8;background:#ADDFFF;"> {{New Paragraph}} {{#viki:pageTitles=Gestalt Wiki Framework Extensions|width=490|height=490}} </div></div> The graph is first initialized with a (user-defined) list of wiki pages, along with all pages linked to these pages. Pages linked to this secondary level of pages are not initially displayed – only the first order links are initially present. The user may then choose to elaborate a node; elaboration involves retrieving and displaying all linked pages for the given node’s page. Elaboration of a node expands the VIKI graph, and users may expand the graph to explore the structure of the wiki. Elaborated nodes are also called hub nodes, and the length of links to hub nodes is longer for improved graph visibility. Users may also choose to hide individual nodes and/or hide entire hubs to focus down the graph to areas of interest. ====Usage==== Users may right click on a given node to bring up a context menu of options. Below is a list of all possible options, but not all nodes may have all options as appropriate. * ''Freeze'': this node becomes frozen in position while other nodes may move around it * ''Visit Page'': opens the page represented by the node in a new tab or window * ''Elaborate'': elaborates a node, as discussed previously * ''Show Categories'': Pops up a JavaScript alert listing the categories this page belongs to. (Under construction.) * ''Hide Node'': Removes this node and links to it from the VIKI graph. * ''Hide Hub'': Removes this hub node and all nodes immediately linked to it from the VIKI graph, unless the linked node is itself a hub. * ''Show All'': Adds all previously-hidden nodes and links back into the VIKI graph. To embed a VIKI graph into a page, the following parser function syntax is used: <div class="row" width=100%><div class="large-12 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:90%;"> <pre>{{ #viki:pageTitles=First Page Title, Second Page Title,…|width=width|height=height|delimiter=delimiter }}</pre> </div></div> '''Parameters''' * ''pageTitles'': a list of wiki pages (given by title) to comprise the initial graph (default: the current page) * ''width'': the desired width (in pixels) of the graph (default: 1200) * ''height'': the desired height of the graph (default: 600) * ''delimiter'': the desired delimiter that separates between pageTitles (default: ,) ====VIKI Plugin System==== VIKI is designed to be extensible, with a built-in hook system. Developers can write MediaWiki extensions which serve as plugins to the core VIKI architecture to enhance or modify the VIKI graph behavior. Details about the plugin structure can be found at [[VIKI Plugin Structure|this page]]. Two VIKI plugins enhance functionality and/or provide compatibility support for other MediaWiki and Semantic MediaWiki extensions: * [[VIKI Semantic Title]] extension provides support for pages using the [http://www.mediawiki.org/wiki/Extension:SemanticTitle Semantic Title] extension * [[VIKI Title Icon]] extension provides enhanced functionality for pages using the [[Title Icon]] extension {{Download|http://www.mediawiki.org/wiki/Extension:VIKI}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 75fb38089784560678141bc7b8f13551e4371702 VIKI Semantic Title 0 224 507 506 2016-02-14T19:09:56Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row"><div class="large-12 columns"> ====Description==== VIKI Semantic Title is an extension to the VIKI extension to handle pages which use semantic page naming. In semantic page naming, the name of a page is not a human-readable title, but rather something of a systematic format (e.g. "Item:1"), and the title of the page is set via a semantic property. Because VikiJS shows page titles for nodes, this extension ensures that the proper page display title is used rather than the systematic title. See also the [http://www.mediawiki.org/wiki/Extension:SemanticTitle SemanticTitle] extension for more details on semantic page naming. The citation pages used to demonstrate Semantic Rating were constructed using Semantic Titles. Instead of displaying node names using actual page names such as Item:1, Item:2, etc., the semantic property [[Property:Full Title]] as the semantic page title. {| style="background:#ADDFFF;" |{{#viki:pageTitles=Semantic Rating|width=900|height=600}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:VikiSemanticTitle}} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=VIKI.png}} [[Category:Page]] 350a8ef4dd8b108abaf53656e562a3a68a8b7321 VIKI Title Icon 0 225 509 508 2016-02-14T19:09:56Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ <div class="row"><div class="large-12 columns"> ====Description==== VIKI Title Icon is an extension to the VIKI extension which adds support for [[Title Icon]]. If a page has a title icon, the title icon will render as the node logo for that page in place of its wiki logo. The VIKI graph below uses the Title Icon property for its the nodes. {| style="background:#ADDFFF;" |{{#viki:pageTitles=Title Icon|width=900|height=600}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:VikiTitleIcon}} {{#set:Title Icon=VIKI.png}} [[Category:Page]] 5079e1f795833e0286d585a273c84489a998ca24 Hierarchy Builder 0 226 511 510 2016-02-14T19:09:56Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row" ><div class="large-7 columns">The Hierarchy Builder extension allows authors to create hierarchies as bullets in a page, use checkboxes to select hierarchical elements from a form, create and edit hierarchies using drag and drop, query and display the hierarchy results. The Table of Contents for this wiki is used as the hierarchy for many of the examples of the use the extension below. This page provides working examples of how to create and display hierarchies, use checkboxes to select hierarchical elements from a form, create and edit hierarchies using drag and drop. The next page provides working examples of how to [[Hierarchy Querying |query hierarchies]]. For download and installation instructions, see [http://www.mediawiki.org/wiki/Extension:HierarchyBuilder HierarchyBuilder].</div> <div class="large-5 columns" style="font-size:80%;"> {{#hierarchySubtree:Gestalt Wiki Framework Extensions|Table of Contents|Hierarchy Data|displaynameproperty=Name|showroot}} </div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} __NOTOC__ {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 035eb613b3bbaa82b13c1b63f3fbcf2c2d23c8de Creating 0 227 513 512 2016-02-14T19:09:57Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns"> This page describes how to create hierarchies using the <nowiki><hierarchy></nowiki> tag. There are three optional attributes the <nowiki><hierarchy></nowiki> tag takes: ''collapsed, displaynameproperty'', and ''autonumbered''. The grey boxes on the left show the wikitext code. The blue boxes on the right show the extension in action.__TOC__</div><div class="large-6 columns">{{Legend}}</div></div> ====Usage: Hierarchy Expanded==== This is an example of the use of the <nowiki><hierarchy></nowiki> tag without any attributes. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> <hierarchy> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy Collapsed==== To show a hierarchy collapsed, add the attribute ''collapsed.'' <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy collapsed> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy collapsed> *[[Gestalt Wiki Framework]] **[[Hierarchy Builder]] **[[Semantic Rating]] **[[Title Icon]] **[[Network Graph]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy With Different Display Names==== <p>To display a different page name, set the attribute ''displaynameproperty'' to a different property name. The citations in this wiki use the following page naming: Item:1..n. Each page in Category:Items has a property Short_Title.</p> <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy displaynameproperty=Short_Title> *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy displaynameproperty=Short_Title> *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> |}</div></div> {{New Paragraph}} ====Usage: Hierarchy With Different Display Names and Element Numbers==== <p>Building on the example above, add the attribute ''numbered.''</p> <div class="row"><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:80%;"> <pre> <hierarchy numbered displaynameproperty=Short_Title > *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> </pre> </div><div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |<hierarchy numbered displaynameproperty=Short_Title > *[[Enterprise Wiki Articles]] **[[Item:1]] **[[Item:4]] **[[Item:2]] **[[Item:3]] **[[Item:5]] </hierarchy> |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] a7fbc000af556b1199050a7ec277b170fba894f7 Talk:Selecting 1 228 515 514 2016-02-14T19:09:57Z Eddie 1 1 revision imported wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Selecting 0 229 517 516 2016-02-14T19:09:57Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}}__NOEDITSECTION__ ==== Description ==== <div class="row"><div class="large-6 columns"> The hierarchySelect Semantic Form input type allows users to select a subset of pages from a hierarchy within a form to populate a multi-valued property of type Page. </div> <div class="large-6 columns">[[Image:ExtensionUsage.png|400px]]<br>Screenshot of Form:Survey</div> </div> ==== Usage ==== The hierarchySelect input type can be seen in action by clicking on the "Click this Link" link. The name of the property that stores the hierarchy [[Property:Hierarchy Data]] and the page on which that property is set, [[Gestalt Extensions]], must be provided in the form in order to be able to locate the hierarchy. <div class="row" ><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre><includeonly> {{{info|page name=Survey Response_<unique number;start=001>|create title=Survey|edit title=Survey}}} {{{for template|Survey}}} {| class="formtable" ! Which extensions have you used? | {{{field|Extensions|input type=hierarchySelect|pagename=Gestalt Extensions|propertyname=Hierarchy Data|list}}} |} {{{end template}}} {{{standard input|save}}} {{{standard input|cancel}}} </includeonly></pre></div> <div class="large-6 columns" style="font-size:90%;"> {| style="border: solid 1px #D0D0D0;" |{{#formlink:form=Survey|link text=Click this link|link type=link}} |- |Click on these pages and then open them using "Edit" dropdown action{{#ask: [[Category:Responses]] |?Extensions |format=table }} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 6567a171190e2f06369774a108e0cde162575803 Querying 0 230 519 518 2016-02-14T19:09:58Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} __NOEDITSECTION__ ====Description==== <div class="row"><div class="large-6 columns"> This page describes how to use Hierarchy Builder's parser functions to query the elements in a hierarchy. __TOC__</div> <div class="large-6 columns">{{Legend}}</div></div> ====Usage: Hierarchy Breadcrumb==== The ''hierarchyBreadcrumb'' parser function can be used to display a hierarchy breadcrumb bar at the top of a page including the previous row, hierarchical parent row, and next row within the hierarchy. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | current page | Text | '' | The current page within the hierarchy for which the breadcrumb should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be used. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | displaynameproperty | Text | '' | The property containing a page's display name if using semantic page names. |} The parser function invocation below displays the breadcrumb for the page ''{{FULLPAGENAME}}'' within the hierarchy stored in property ''Hierarchy Data'' on the page ''Table of Contents'' using the semantic page names stored within the property ''Name'' on each page. The bar might contain the row that immediately precedes ''{{FULLPAGENAME}}'', immediately succeeds ''{{FULLPAGENAME}}'', and the hierarchical parent of ''{{FULLPAGENAME}}'' within the hierarchy on the page ''Table of Contents''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}} |}</div></div> ====Usage: Hierarchy Children==== The ''hierarchyChildren'' parser function can be used to retrieve the immediate hierarchical children of a given page from a hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | '' | The target page within the hierarchy for which the immediate children should be returned. If left empty then all root level rows will be returned instead. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | template | Text | '' | The name of a template with which to display the printouts. |- | introtemplate | Text | '' | The name of a template to display before the results if there are any. |- | outrotemplate | Text | '' | The name of a template to display after the results if there are any. |- | link | 'none' / <i>empty</i> | '' | Used to specify whether or not to display results as links if there are any results. |- | sep | Text | ',' | Used to specify the separator for returned values. |} The parser function takes the following three mandatory arguments in order: page name, hierarchy page, and hierarchy property. There are also the following optional arguments: ''sep'', ''template'', ''introtemplate'', ''outrotemplate'', and ''link''. The ''sep'' argument is used to specify the separator for returned values. The argument ''template'' is the name of a template with which to display the printouts. The ''introtemplate'' argument is the name of a template to display before the results if there are any. The ''outrotemplate'' argument is the name of a template to display after the results if there are any. The argument ''link'' is used to specify whether or not to display results as links if there are any results. The value of the ''link'' argument can either be empty or ''none''. By default, ''link'' is enabled. The parser function invocation below displays the template ''Y'' followed by the immediate children of the page ''Table of Contents'' in the hierarchy stored in the property ''hierarchy property'' on the page ''hierarchy page'' after applying the template ''X'' to each result, followed by the template ''Z''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyChildren:Hierarchy Builder|Table of Contents|Hierarchy Data|template=X|introtemplate=Y|outrotemplate=Z|link=none}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyChildren:Hierarchy Builder|Table of Contents|Hierarchy Data|template=X|introtemplate=Y|outrotemplate=Z|link=none}} |}</div></div> ====Usage: Hierarchy Parent==== The ''hierarchyParent'' parser function is used to retrieve the hierarchical parent of a given page from a hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | Mandatory | The target page within the hierarchy for which the immediate hierarchical parent should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | template | Text | '' | The name of a template with which to display the printouts. |- | introtemplate | Text | '' | The name of a template to display before the results if there are any. |- | outrotemplate | Text | '' | The name of a template to display after the results if there are any. |- | link | 'none' / <i>empty</i> | '' | Used to specify whether or not to display results as links if there are any results. |- | sep | Text | ',' | Used to specify the separator for returned values. |} The parser function take the following three mandatory arguments in order: page name, hierarchy page, and hierarchy property. Additionally, there are also the following optional arguments: ''template'', ''introtemplate'', ''outrotemplate'', and ''link''. Each of these arguments behaves the same as they do for the ''hierarchyChildren ''parser function above. The argument ''template'' is the name of a template with which to display the printouts. The ''introtemplate'' argument is the name of a template to display before the results if there are any. The ''outrotemplate'' argument is the name of a template to display after the results if there are any. The argument ''link'' is used to specify whether or not to display results as links if there are any results. The value of the ''link'' argument can either be empty or ''none''. By default, ''link'' is enabled. The parser function invocation below displays the hierarchical parent row of ''{{FULLPAGENAME}}'' within the hierarchy stored in property ''hierarchy property'' on the page ''hierarchy page name'' rendered as a hyperlink. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchyParent:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|link=none}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyParent:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|link=none}} |}</div></div> ====Usage: Hierarchy Section Number==== The ''hierarchySectionNumber'' parser function is used to automatically compute a given page's section number within a particular hierarchy on a specified page. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | page name | Text | Mandatory | The target page within the hierarchy for which the section number should be returned. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |} The parser function takes three mandatory arguments in order: page name, hierarchy page, and hierarchy property. The parser function invocation below give the section number of the page ''{{FULLPAGENAME}}'' within the hierarchy in property ''Hierarchy Data'' on the page ''[[Table of Contents]]''. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchySectionNumber:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySectionNumber:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data}} |}</div></div> ====Usage: Hierarchy Subtree==== The ''hierarchySubtree'' parser function is used to render the subtree rooted at a given node within a specified hierarchy. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | root node | Text | Mandatory | The node that forms the root of the desired subtree. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | format | 'ul' / <i>empty</i> | '' | Used to specify the display formatting of the returned subtree. Either bulleted or hierarchical. |- | displaynameproperty | Text | '' | The name of the property containing a page's display name. Used to support semantic page names. |- | showroot | 'showroot' / <i>empty</i> | '' | Used to specify that the subtree's root should also be displayed. |- | collapsed | 'collapsed' / <i>empty</i> | '' | Used to specify that the subtree should be initialized in collapsed mode. |} The parser function takes three mandatory arguments in order: root node, hierarchy page, and hierarchy property. If format is given as 'ul' then the subtree will be rendered as a bulleted list. Otherwise, the subtree is rendered by default as a hierarchy. If 'showroot' is given then the root of the subree will be rendered as a part of the result. By default the root of the subtree is hidden in the display. If 'collapsed' is given then the subtree will be initialized in collapsed mode. By default the subtree is not rendered in collapsed mode. The parser function invocation below renders the subtree rooted at "Hierarchy Builder" within the hierarchy in property ''Hierarchy Data'' on the page ''Table of Contents'' as a bulleted list. <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:70%;"> <pre> {{#hierarchySubtree:Hierarchy Builder|Table of Contents|Hierarchy Data}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySubtree:Hierarchy Builder|Table of Contents|Hierarchy Data}} |}</div></div> ====Usage: Hierarchy Selected==== The ''hierarchySelected'' parser function is used to find and render the minimum spanning tree that contains specified rows within a hierarchy in addition to the root node of the specified hierarchy. The rendered minimum spanning tree will show each selected node with a checked box. The parameters are given in the table below: {| class="wikitable" ! Parameter ! Type ! Default ! Description |- | selected pages | Text | Mandatory | A comma delimited list of rows that are selected within a hierarchy. |- | hierarchy page | Text | Mandatory | The page containing the hierarchy to be searched. |- | hierarchy property | Text | Mandatory | The name of the semantic property containing the hierarchy data. |- | display mode | 'collapsed' / <i>empty</i> | '' | Used to specify whether the rendered minimum spanning tree should be initialized in collapsed mode or not. |} The parser function takes three mandatory arguments in order: selected pages, hierarchy page, and hierarchy property. If the display mode is given as 'collapsed' then the minimum spanning tree will be initialized in collapsed display mode. The parser function invocation below renders the minimum spanning tree in collapsed mode of the hierarchy in property ''hierarchy property'' on the page ''hierarchy page name'' which contained the hierarchy root and each of the listed page names so that the listed page names would be marked as "checked". <div class="row" width=100%><div class="large-5 columns" style="margin-left:20px;border: solid 1px #D0D0D0;background: #F0F0F0;font-size:60%;"> <pre> {{#hierarchySelected:Creating,Editing,Selecting,Querying|Table of Contents|Hierarchy Data|collapsed}} </pre></div><div class="large-6 columns" style="font-size:80%;"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchySelected:Creating,Editing,Selecting,Querying|Table of Contents|Hierarchy Data|collapsed}} |}</div></div> {{Download|http://www.mediawiki.org/wiki/Extension:HierarchyBuilder}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 2632ea1e3c5b8b961b5864997ef710118c562252 About 0 231 521 520 2016-02-14T19:09:58Z Eddie 1 1 revision imported wikitext text/x-wiki {{Breadcrumb}} <div class="row" ><div class="large-6 columns">GWF wikis are hosted on virtual machines built on a LAMP stack. LAMP includes: *{{Elink|http://en.wikipedia.org/wiki/Linux|Linux}} operating system, *{{Elink|http://en.wikipedia.org/wiki/Apache_HTTP_Server|Apache HTTP Server}}, *{{Elink|http://en.wikipedia.org/wiki/MySQL|MySQL}} relational database management system, and *{{Elink|http://en.wikipedia.org/wiki/PHP|PHP}} programming language. {{New Paragraph}} Wiki software from {{Elink|http://www.mediawiki.org/wiki/MediaWiki|MediaWiki}} and {{Elink|https://semantic-mediawiki.org|Semantic MediaWiki}} is used. MediaWiki is used to run {{Elink|https://en.wikipedia.org/|Wikipedia}} and is used by {{Elink|https://wikiapiary.com/wiki/Main_Page|over 25,000}} sites. Semantic MediaWiki is used by {{Elink|https://wikiapiary.com/wiki/Main_Page|over 1,300 sites}} to annotate page content with properties that can be queried and visualized. Many GWF extensions, some of which are MediaWiki extensions and others which are Semantic MediaWiki extensions have been contributed to the {{Elink|http://www.mediawiki.org/wiki/Category:Extensions_by_MITRE|open source community}}. All the software components used to build this GWF wiki are automatically listed on the [[Special:Version|version page]]. </div> <div class="large-6 columns">[[Image:MGF.png|600px]]<br>GWF Stack</div></div> To learn more about Gestalt Wiki Framework, see our [[Publications|publications]], [[Team|team]], [[MITRE|enterprise]], and [[Contact |contact information]] pages. {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] cdf4b93b326c5b1d417512739184e705d57cd892 Blogs and Presentations 0 232 523 522 2016-02-14T19:09:59Z Eddie 1 1 revision imported wikitext text/x-wiki __NOEDITSECTION__ ====Blogs==== [[Image:BlogOrigins.png|200px|link=https://publish.mitre.org/kde/2015/03/26/gestalt-wikis-at-mitre-march-2015]] [https://publish.mitre.org/kde/2015/03/26/gestalt-wikis-at-mitre-march-2015/ Gestalt Wikis at MITRE Knowledge Driven Enterprise Blog] ---- ====Presentations==== {{#ask: [[Category:Presentations]] |limit=100 |?Responsive Presentation= |?Has date=Date |sort=Has date |order=descending |mainlabel=- |format=table }} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon=Presentations.png}} [[Category:Page]] 72a0948a6ecfd70509d7ac36ad1520340cc17141 Team 0 233 525 524 2016-02-14T19:09:59Z Eddie 1 1 revision imported wikitext text/x-wiki {{#ask: [[Category:Users]][[Linkedin-url::+]] |?Linkedin-url= |?Name= |format=template |template=Gallery }} {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 9b40ff5b461351505cc3046dee205ad0f0f54985 Nested Tabs 0 234 527 526 2016-02-14T19:10:00Z Eddie 1 1 revision imported wikitext text/x-wiki <div style="font-size:80%;"> <div class="section-container auto" data-section> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Background</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework}}}} {{Tab||Background|{{:Background}}}} {{Tab||Enterprise Collaboration|{{:Enterprise Collaboration}}}} {{Tab||Content Networks|{{:Content Networks}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Design</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Development</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Configure a Wiki|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Classes|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Queries and Visualizations|[[Image:UnderConstruction.png|50px]]}} {{Tab||Patterns|[[Image:UnderConstruction.png|50px]]}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Gestalt Wiki Framework Extensions</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework Extensions}}}} {{Tab||Title Icon|{{:Title Icon}}}} {{Tab||Semantic Rating|{{:Semantic Rating}}}} {{Tab||VIKI Network Graph|{{:VIKI Network Graph}}}} {{Tab||VIKI Semantic Title|{{:VIKI Semantic Title}}}} {{Tab||VIKI Title Icon|{{:VIKI Title Icon}}}} {{Tab||Hierarchy Builder|{{:Hierarchy Builder}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>About</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Publications|{{:Publications}}}} {{Tab||Team|{{:Team}}}} {{Tab||MITRE|{{:MITRE}}}} {{Tab||Contact|{{:Contact}}}} </div></div></div> </div> __NOTOC__ {{#set:Hide Title Icon=all}} c8a0aaf4f28e87f141edba6963927368fddb3de0 MITRE 0 235 529 528 2016-02-14T19:10:00Z Eddie 1 1 revision imported wikitext text/x-wiki <div class="row" ><div class="large-8 columns">Our team works at MITRE, a not-for-profit organization that operates research and development centers sponsored by the federal government. MITRE operates FFRDCs—federally funded research and development centers—which are unique organizations that assist the United States government with: * Scientific research and analysis * Development and acquisition * Systems engineering and integration MITRE also has an independent research program that explores new and expanded uses of technologies to solve customers' problems. For more information about MITRE, visit [http://www.mitre.org mitre.org].</div><div class="large-4 columns">[[Image:MITRE1.png|500px|MITRE McLean, VA]]<br>MITRE, McLean, VA</div></div> {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 102774df2e2047838096c6b4ab061e543b226a6e Contact 0 236 531 530 2016-02-14T19:10:01Z Eddie 1 1 revision imported wikitext text/x-wiki If you are interested in *Learning more about the Gestalt Wiki Framework, *How enterprise wikis can help government agencies build and share knowledge, or *Providing us feedback on this site, Please send email to: [mailto:bclemente@mitre.org Gestalt Wiki Framework team]. {{#set:Title Icon={{PAGENAME}}.png}} [[Category:Page]] 73e6ba07c11f1e0839bd9e2a41939258ff0912e9 Vision 0 237 533 532 2016-02-14T19:10:04Z Eddie 1 1 revision imported wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Wiki Federation 0 238 535 534 2016-02-14T19:10:05Z Eddie 1 1 revision imported wikitext text/x-wiki [[Category:Page]] 6d68468a3db13903a05fdaee202205a53a76ce07 Nested Tabs 2 0 239 537 536 2016-02-14T19:10:06Z Eddie 1 1 revision imported wikitext text/x-wiki <div style="font-size:80%;"> <div class="section-container auto" data-section> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Background</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework}}}} {{Tab||Background|{{:Background}}}} {{Tab||Enterprise Collaboration|{{:Enterprise Collaboration}}}} {{Tab||Content Networks|{{:Content Networks}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Design</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Wiki Development</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Configure a Wiki|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Classes|[[Image:UnderConstruction.png|50px]]}} {{Tab||Create Queries and Visualizations|[[Image:UnderConstruction.png|50px]]}} {{Tab||Patterns|[[Image:UnderConstruction.png|50px]]}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>Gestalt Wiki Framework Extensions</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Introduction|{{:Gestalt Wiki Framework Extensions}}}} {{Tab||Title Icon|{{:Title Icon}}}} {{Tab||Semantic Rating|{{:Semantic Rating}}}} {{Tab||VIKI Network Graph|{{:VIKI Network Graph}}}} {{Tab||VIKI Semantic Title|{{:VIKI Semantic Title}}}} {{Tab||VIKI Title Icon|{{:VIKI Title Icon}}}} {{Tab||Hierarchy Builder|{{:Hierarchy Builder}}}} </div></div></div> <div class="section"> <p class="title" style="font-size:small;" data-section-title>About</p> <div class="content" data-section-content> <div class="section-container auto" style="font-size:small;" data-section> {{Tab||Publications|{{:Publications}}}} {{Tab||Team|{{:Team}}}} {{Tab||MITRE|{{:MITRE}}}} {{Tab||Contact|{{:Contact}}}} </div></div></div> </div> __NOTOC__ {{#set:Hide Title Icon=all}} c8a0aaf4f28e87f141edba6963927368fddb3de0 Property:Abstract 102 240 539 538 2016-02-14T19:10:06Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Author 102 241 541 540 2016-02-14T19:10:07Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Average Rating Stars 102 242 543 542 2016-02-14T19:10:07Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Citation 102 243 545 544 2016-02-14T19:10:07Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:DOI 102 244 547 546 2016-02-14T19:10:08Z Eddie 1 1 revision imported wikitext text/x-wiki [[Has type::Text]] [[Category:Framework Pages]] 793928a9cf583921e396749ebc4a0c88e2d40746 Property:Five Star Review Count 102 245 549 548 2016-02-14T19:10:08Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Four Star Review Count 102 246 551 550 2016-02-14T19:10:08Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Full Title 102 49 553 73 2016-02-14T19:10:08Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 Property:Item 102 247 555 554 2016-02-14T19:10:09Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Page]]. [[Category:Framework Pages]] 35138e263c93432ca7be64f2ecdb8edf070d91e5 Property:Item Type 102 59 557 124 2016-02-14T19:10:09Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] [[Allows value::article]] [[Allows value::book]] [[Allows value::booklet]] [[Allows value::conference]] [[Allows value::inbook]] [[Allows value::incollection]] [[Allows value::inproceedings]] [[Allows value::manual]] [[Allows value::mastersthesis]] [[Allows value::misc]] [[Allows value::phdthesis]] [[Allows value::proceedings]] [[Allows value::standard]] [[Allows value::techreport]] [[Allows value::unpublished]] abcd7257bbc4f8f15fdc7663c0b0f654f7b111a9 Property:Item Type Image 102 248 559 558 2016-02-14T19:10:09Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Keyword Links 102 249 561 560 2016-02-14T19:10:09Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:One Star Review Count 102 250 563 562 2016-02-14T19:10:10Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Publisher 102 251 565 564 2016-02-14T19:10:10Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Rating 102 252 567 566 2016-02-14T19:10:11Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Number]]. [[Category:Framework Pages]] 58a20cb7fe63db16b7ea0e1b733e8a5bf9e55ac8 Property:Review Title 102 253 569 568 2016-02-14T19:10:11Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Property:Reviewer 102 254 571 570 2016-02-14T19:10:11Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Page]]. [[Category:Framework Pages]] 35138e263c93432ca7be64f2ecdb8edf070d91e5 Property:Sorting Title 102 255 573 572 2016-02-14T19:10:11Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Property:Three Star Review Count 102 256 575 574 2016-02-14T19:10:12Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Two Star Review Count 102 257 577 576 2016-02-14T19:10:12Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Volume 102 258 579 578 2016-02-14T19:10:12Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Property:Year 102 259 581 580 2016-02-14T19:10:13Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::String]]. [[Category:Framework Pages]] f250aed81da8f3df5d26714a915e6cee93cd086e Template:Presentation 10 260 583 582 2016-02-14T19:10:13Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly>{| class="wikitable" ! Description | {{{Description|}}} |- ! Authors | {{#arraymap:{{{Authors|}}}|,|@@@@|[[User:@@@@]]}} |- ! Date | {{{Has date|}}} |} {{#if:{{{File|}}}| {{#widget:Iframe |url={{filepath:{{{File}}}}} |width=900 |height=800 |border=0 }}}} <div style="display:none;"> {{#set:Name={{{Name|}}}}} {{#set:Description={{{Description|}}}}} {{#arraymap:{{{Authors|}}}|,|@@@@|{{#set:Authors=@@@@}}}} {{#set:Has date={{{Has date|}}}}} {{#set:Responsive Presentation=<div class="row"><div class="large-2 columns">[[Image:{{{Thumbnail}}}|200px|link={{PAGENAME}}]]</div><div class="large-10 columns">[[{{PAGENAME}}]]</div></div>}} [[Category:Presentations]] </div> </includeonly><noinclude>[[Category:Framework Pages]]</noinclude> 2a607dea97787ff2a039fecffd8ded441ff5e27c Form:Presentation 106 261 585 584 2016-02-14T19:10:13Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly> {{{for template|Presentation}}} {| class="formtable" ! Description | {{{field|Description}}} |- ! Authors: | {{{field|Authors}}} |- ! Date | {{{field|Has date}}} |- ! Thumbnail | {{{field|Thumbnail|uploadable}}} |- ! File | {{{field|File|uploadable}}} |} {{{end template}}} {{{standard input|save}}} {{{standard input|cancel}}} </includeonly> <noinclude> [[Category:Framework Pages]] </noinclude> aec2aff2b37674cc42c9dc0386c81e1dbab4506c Property:Has date 102 163 587 373 2016-02-14T19:10:13Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Date]]. 5263c8921631f25051f416df19a72490a588561e Keywords 0 262 589 588 2016-02-14T19:10:13Z Eddie 1 1 revision imported wikitext text/x-wiki <div style="display:none;"> {{#vardefine:keyword|{{lc:{{#urldecode:{{#urlget:keyword}}}}}}}} </div> {{#ask:[[Category:Research Proposals]][[Keywords::{{#var:keyword}}]] |?Average Rating Stars |?Citation |mainlabel=- |headers=hide |class=citationtable |limit=50 |searchlabel= |sort=Average Rating Number |order=desc }} <div style="display:none;"> {{#set:Dynamic Display=$keyword}} {{#set:Logo Link=Keywords.png}} {{DISPLAYTITLE:{{#var:keyword}}}} [[Category:Framework Pages]] </div> ad18314a82d7b8c5bc77819db0cd653f023cd104 Property:Keyword 102 263 591 590 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki This is a property of type [[Has type::Text]]. [[Category:Framework Pages]] f456953c0b52bc8e666e3709beefc9c3e44d970b Template:Breadcrumb 10 264 593 592 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly><div class="row"><div class="large-12 columns" class="hierarchyText">{{#hierarchyBreadcrumb:{{FULLPAGENAME}}|Table of Contents|Hierarchy Data|Name}}</div></div> <div class="row"><div class="large-12 columns">{{New Paragraph}}</div></div></includeonly> e6bbeffbad3499881227a476c9a39a2b118ee7be Template:New Paragraph 10 62 595 132 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly> <div class="np"></div> </includeonly><noinclude>[[Category:Framework Pages]]</noinclude> 4de0b1b5b72807dfd76e4dafde6bab88c4430c85 Template:RefList 10 265 597 596 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly> '''References''' <div id="reference-block"> <references /></div></includeonly> 26237a1877fd0c09294cb2c9fc083e4a7448c9c3 Template:Elink 10 266 599 598 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly><span class="plainlinks">[{{{1}}} {{{2}}}]</span></includeonly> d5574cbe6609c35f82ca56241f049a823b7fdfac Template:Legend 10 267 601 600 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly> <div style="border: solid 1px #c0c0c0;"> <div class="row" style="padding:5px;"><div class="small-12 columns" style="color:#009933;">'''Legend'''</div></div><div style="padding:5px;font-size:90%;"><div class="row" style="margin-bottom:-3px;"><div class="small-3 columns">Wiki text</div><div class="small-9 columns"> {| style="background: #F0F0F0;" |<pre> {{{field|Rating|input type=rating}}} </pre> |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns">Live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#hierarchyBreadcrumb:Querying|Table of Contents|Hierarchy Data|Name}} |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns" >Live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;background: #ADDFFF;" |{{#rating:3|10}} |}</div></div> <div class="row" style="margin-bottom:-3px;"><div class="small-3 columns" >Link to live example</div><div class="small-9 columns"> {| style="border: solid 1px #D0D0D0;" | See [[Special:FormEdit/Review/Review:1/Bclemente | Review]] |}</div></div></div></div> </includeonly> 9c763bc2345b735539f9f07274d6803a88d8585b Template:Download 10 268 603 602 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly> {| | style="width:100%;background:#eee3d0; font-weight:normal; font-size:80%;border: solid 1px #e0cdab;text-align:left; font-color:#000; padding:5px 5px;margin-bottom:-1px;"|[[Image:Download.png|36px|link=]] Download links and installation instructions may be found here: {{{1}}} |} </includeonly> 3a1fc8aff1d7a1df320b5a9ba2995f21b58b1568 Template:Gallery 10 269 605 604 2016-02-14T19:10:14Z Eddie 1 1 revision imported wikitext text/x-wiki <includeonly><div style="display: inline-block;margin: 5px;"> {| |{{#widget:LinkedIn Profile |profile={{{2}}} |name={{{3}}} |norelated }} |- |[[File:Gestalt Wiki Framework.png|24px|link=]] {{{1}}} |}</div> </includeonly> 3f46729562273b5c431aef415b9292cb47da7388 File:Download.png 6 270 607 2016-02-14T19:19:56Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Property:Knowledge type 102 207 608 474 2016-02-14T19:28:53Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::String]]. 28995a61238b5697df1bb46875d44755b356227c Types of Knowledge 0 204 609 475 2016-02-14T19:33:42Z Eddie 1 wikitext text/x-wiki '''TACIT KNOWLEDGE''' <br /> Tacit knowledge resides in an individual’s mind. It is the domain of individuals, not technology. All individuals have a unique, personal store of knowledge gained from life experiences, training, and formal and informal networks of friends and professional acquaintances. It includes learned nuances, subtleties, and work-arounds. Intuition, mental agility, effective responses to crises, and the ability to adapt are also forms of tacit knowledge. Leaders use tacit knowledge to solve complex problems and make decisions. They also routinely engage subordinates’ tacit knowledge to improve organizational learning and enhance unit innovation and performance. {{New Paragraph}} '''EXPLICIT KNOWLEDGE''' <br /> Explicit knowledge consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decisionmaking. [[Categorizing Knowledge]] Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} [[Category:KMO Pages]]__NOEDITSECTION__ __NOTOC__ 00cfc2eb764438d6c16322a694aa1e2cd83b3a6a Categorizing Knowledge 0 271 610 2016-02-14T19:35:20Z Eddie 1 Created page with "= Qualitative Knowledge = = Quantitative Knowledge = = Reference Knowledge = = Community Knowledge = <headertabs /> Source [[Source::Knowledge Management Operations]] {{#..." wikitext text/x-wiki = Qualitative Knowledge = = Quantitative Knowledge = = Reference Knowledge = = Community Knowledge = <headertabs /> Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} 5bcf15d1da44741baa19df7ccc2c25bee71d93c5 611 610 2016-02-14T19:37:12Z Eddie 1 wikitext text/x-wiki = Doctrine Knowledge = = Qualitative Knowledge = = Quantitative Knowledge = = Reference Knowledge = = Community Knowledge = <headertabs /> Source [[Source::Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{#set:Title Icon={{PAGENAME}}.png}} dcb4b78257fb2ead6d2d8602aea02405f7ce8a05 Knowledge Center 0 200 612 466 2016-02-14T19:38:08Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{Knowledge Base}} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 7e8d7f6ebac240f0b32f634a9b74b0ef819154d5 615 612 2016-02-14T19:42:01Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} = KMO = {{Knowledge Base}} <br /> [[Knowledge Management Operations]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} cd2ab34fa6974b9dcf46897586da43d907f30b7c 617 615 2016-02-16T05:25:51Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 21e5f0a2737b63ed9e5292408193246bac0742b9 Template:Knowledge Base 10 272 613 2016-02-14T19:38:25Z Eddie 1 Created page with "The knowledge base consists of five types of knowledge. *'''Doctrine Knowledge''' - chunked knowledge from U.S. Army Field Manuals, Joint Operations, and NATO STANAGS. *'''Re..." wikitext text/x-wiki The knowledge base consists of five types of knowledge. *'''Doctrine Knowledge''' - chunked knowledge from U.S. Army Field Manuals, Joint Operations, and NATO STANAGS. *'''Reference Knowledge''' - chunked reference knowledge encyclopedic sources, social science papers published in peer reviewed journals, authoritative aggregators of reference knowledge *'''Quantitative Knowledge''' - chunked quantitative knowledge from social science databases, social science papers analyzing quantitative data,social science risk analysis reports interpreting event databases. *'''Current Knowledge''' - chunked current knowledge from authoritative news sources. *'''Community Knowledge''' - questions and answers from our communities of interest. 645da2d3698aeeaa1258c9e9f1be4bf2e645ae83 614 613 2016-02-14T19:40:25Z Eddie 1 wikitext text/x-wiki The knowledge base consists of five types of knowledge. *'''Doctrine Knowledge''' - chunked knowledge from Air Force Doctrine Documents, Joint Publications, and NATO STANAGS. *'''Reference Knowledge''' - chunked reference knowledge encyclopedic sources, authoritative aggregators of reference knowledge *'''Quantitative Knowledge''' - chunked quantitative knowledge from social science databases, social science papers analyzing quantitative data,social science risk analysis reports interpreting event databases. *'''Current Knowledge''' - chunked current knowledge from authoritative news sources. *'''Community Knowledge''' - questions and answers from our communities of interest. 45b20e7a0d63afde3e6907ca98fb6f5a87ee0126 MediaWiki:Vector.css 8 273 616 2016-02-16T04:50:22Z Eddie 1 Created page with "/* CSS placed here will affect users of the Vector skin */ .float-right { float: right; } .float-left { float: left; } .left-column { width:49%; float: left; } .r..." css text/css /* CSS placed here will affect users of the Vector skin */ .float-right { float: right; } .float-left { float: left; } .left-column { width:49%; float: left; } .right-column { width:49%; float: right; } .width-seventy-percent { width:69%; } .width-thirty-three-percent { width:33%; } .width-thirty-two-percent { width:32%; } .margin-left-ten-pixels { margin-left: 9px; } .width-thirty-percent { width:30%; } .width-forty-eight-percent { width:48%; } .three-column { width:33%; float:left; } #main-page #toc { display: none; } #toc { float: right; } #main-page p { padding: 0px 15px; } #main-page li { margin-left: 12px; } #main-page .small-box { border: 1px solid #9fb3c0; Xheight: 95px; margin-bottom: 20px; } #main-page .medium-box { border: 1px solid #9fb3c0; Xheight: 162px; margin-bottom: 20px; } #main-page h3 { border-bottom: 1px solid #80a8c6; padding: 5px 15px; background-color: #e2f1fc; color: #0e2349; } #main-page h2 { border-bottom: 1px solid #80a8c6; padding: 7px 15px; background-color: #cbe5f9; color: #0e2349; } .lss-widget-header { width: 100%; background-color: #4159bb; border: 1px solid #4159bb; color: #fff; margin-top: 15px; height: 22px; line-height: 22px; } .lss-widget-header { width: 100%; background-color: #bddfff; Xbackground-color: #dddddd; border: 1px solid #b8b8b8; color: #333; margin-top: 15px; height: 22px; line-height: 22px; font-weight: bold; } .lss-widget-header-text { padding-left: 7px; font-family : verdana, geneva, Arial, Helvetica, sans-serif; Xfont-size: 90%; } .lss-widget-body{ width: 100%; border: 1px solid #b8b8b8; border-top: 0px solid #b8b8b8; background-color: #f9f9f9; } .lss-widget-body-text{ padding: 4px 7px 5px 7px; margin: 0px; font-family : verdana, geneva, Arial, Helvetica, sans-serif; Xfont-size:90%; } .lss-li { border-bottom: 1px solid #b8b8b8; line-height: 28px; height: 28px; } .lss-li-no-border { line-height: 28px; height: 28px; } .lss-li-link{ padding-left: 7px; } .lss-widget-footer{ padding: 0px 5px 0px 5px; margin: 0px; } .header-lss { Xfont-family: "Palatino Linotype","Book Antiqua",Palatino,serif; border-bottom: 1px solid #aaa; margin-top: 15px; font-size: 16px; padding-bottom: 2px; } .bold { font-weight: bold; } #bodyContent table { border-collapse: collapse; margin: 1em 0; } #bodyContent th, #bodyContent td { border: 1px solid #999; padding: 4px 8px; } #bodyContent th, #bodyContent td { border: 1px solid #999; padding: 4px 8px; } #bodyContent td.cell-green { background-color:#E0F5D6; } #bodyContent th[scope="row"] { text-align: left; vertical-align: middle; } #bodyContent table.complex { } #bodyContent table.complex td { text-align:center; } #bodyContent table.complex tr.tbody { border-top: 3px double #999; } #pt-login a:before { content: "Wiki "; } d2882022e71fe13edbf4d5733c967e8d6e04c923 MediaWiki:Common.jss 8 274 618 2016-02-16T05:45:59Z Eddie 1 Created page with "/* Any JavaScript here will be loaded for all users on every page load. */ /* Any JavaScript here will be loaded for all users on every page load. */ var ttbutton = {..." wikitext text/x-wiki /* Any JavaScript here will be loaded for all users on every page load. */ /* Any JavaScript here will be loaded for all users on every page load. */ var ttbutton = { "imageFile": "images/5/5f/Btn_toolbar_tt.png", // image to be shown on the button (may be a full URL too), 22x22 pixels "speedTip": "monotyped text", // text shown in a tooltip when hovering the mouse over the button "tagOpen": "<tt>", // the text to use to mark the beginning of the block "tagClose": "</tt>", // the text to use to mark the end of the block (if any) "sampleText": "monotyped text" // the sample text to place inside the block }; mwCustomEditButtons.push(ttbutton); var codebutton = { "imageFile": "images/2/23/Button_code.png", // image to be shown on the button (may be a full URL too), 22x22 pixels "speedTip": "code", // text shown in a tooltip when hovering the mouse over the button "tagOpen": "<code>", // the text to use to mark the beginning of the block "tagClose": "</code>", // the text to use to mark the end of the block (if any) "sampleText": "code is here" // the sample text to place inside the block }; mwCustomEditButtons.push(codebutton); /** * Hide prefix in category * * @source: www.mediawiki.org/wiki/Snippets/Hide_prefix_in_category * @rev: 3 * @author Krinkle */ mw.loader.using( 'jquery.mwExtension', function () { var $tplHideCategoryPrefix = $( '#mw-cat-hideprefix' ); if ( $tplHideCategoryPrefix.length ) { var prefix = $tplHideCategoryPrefix.text(); if ( $.trim( prefix ) === '' ) { prefix = mw.config.get( 'wgTitle' ) + '/'; } // Override links $( '#mw-pages, #examples' ).find( 'a' ).text( function( i, val ){ return val.replace( new RegExp( '^' + $.escapeRE( prefix ) ), '' ); } ); // Hide category column header initial $( '#mw-pages' ).find( 'h3' ).hide(); } } ); /** * Hide firstheading * @author mwjames */ mw.loader.using( 'jquery.mwExtension', function () { var hidefirstheading = $( '#smw-hide-firstheading' ); if ( hidefirstheading.length ) { // Hide firstHeading $( '#content' ).find( '#firstHeading' ).hide(); } } ); /** * Tab/Panel right slide * @author mwjames */ $("#panel-tab").click( function (event) { event.stopPropagation(); showIfNotVisible( "#panel-content" ); } ); function showIfNotVisible( element ) { var width = $( '#panel' ).find( 'table').width() + 8; if ( $(element).css( "width" ) == width + 'px' ) $(element).animate( { width: 4 }, 1500); else $(element).animate( { width: width }, 1500); }; $( function() { var element = $("#panel-content"), status = element.attr( 'class' ), width = element.find( 'table').width() + 8; if ( status === 'close' ){ element .width( width ) .animate( { width: 4 }, 1200); } else { element .width( width ); } } ); /** * Modified bootstrap class for tables */ importStylesheet('MediaWiki:Bootstrap.css'); /** * Additional linked icon for the searchlabel of result format "feed" * * @since 1.9.0 * * @rev 1 * @author mwjames */ $( '.smw-feed-furtherresults > a' ).addClass( 'feedlink' ); /** * Prepend w3c validation url * * @since 1.9.0 * * @rev 1 * @author mwjames */ $( '.feed-validation' ).find( 'a' ) .attr( 'href','http://validator.w3.org/check?uri=http://www.semantic-mediawiki.org' + $( '.feed-validation' ).find( 'a' ).attr( 'href' ) ) .removeClass( 'feedlink' ); /* SMWAgenda */ $(function(){ $('.ag-item-read').click(function(e){ var text = $(this).parent().parent().find('.ag-item-span-text'); if($(text).height() > 30) { $(this).find('a').text('read more'); $(text).animate({'height':'30px'},250); }else{ //if($(text).height() == 30 && $(this).find('a').text() == 'less' ) { // $(this).find('a').text('read more'); // return false; //} $(text).css({'height':'auto'}); $(this).find('a').text('less') } e.preventDefault(); return false; }); $('.ag-item-read').each(function(i,v){ var text = $(this).parent().parent().find('.ag-item-span-text'); $(text).css({'height':'auto'}); $(v).hide(); }); $('.smw-promo-btn').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2013/Tutorial_day" />'); $('.smw-promo-btn2').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2013/Conference_days" />'); $('.smw-promo-btn2015f0').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2015/Tutorial_Day" />'); $('.smw-promo-btn2015f1').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2015/Conference_Days" />'); }); 6394e2d711d71343c9bd90f02b4347ecb1164b40 619 618 2016-02-16T05:47:32Z Eddie 1 wikitext text/x-wiki /* Any JavaScript here will be loaded for all users on every page load. */ var ttbutton = { "imageFile": "images/5/5f/Btn_toolbar_tt.png", // image to be shown on the button (may be a full URL too), 22x22 pixels "speedTip": "monotyped text", // text shown in a tooltip when hovering the mouse over the button "tagOpen": "<tt>", // the text to use to mark the beginning of the block "tagClose": "</tt>", // the text to use to mark the end of the block (if any) "sampleText": "monotyped text" // the sample text to place inside the block }; mwCustomEditButtons.push(ttbutton); var codebutton = { "imageFile": "images/2/23/Button_code.png", // image to be shown on the button (may be a full URL too), 22x22 pixels "speedTip": "code", // text shown in a tooltip when hovering the mouse over the button "tagOpen": "<code>", // the text to use to mark the beginning of the block "tagClose": "</code>", // the text to use to mark the end of the block (if any) "sampleText": "code is here" // the sample text to place inside the block }; mwCustomEditButtons.push(codebutton); /** * Hide prefix in category * * @source: www.mediawiki.org/wiki/Snippets/Hide_prefix_in_category * @rev: 3 * @author Krinkle */ mw.loader.using( 'jquery.mwExtension', function () { var $tplHideCategoryPrefix = $( '#mw-cat-hideprefix' ); if ( $tplHideCategoryPrefix.length ) { var prefix = $tplHideCategoryPrefix.text(); if ( $.trim( prefix ) === '' ) { prefix = mw.config.get( 'wgTitle' ) + '/'; } // Override links $( '#mw-pages, #examples' ).find( 'a' ).text( function( i, val ){ return val.replace( new RegExp( '^' + $.escapeRE( prefix ) ), '' ); } ); // Hide category column header initial $( '#mw-pages' ).find( 'h3' ).hide(); } } ); /** * Hide firstheading * @author mwjames */ mw.loader.using( 'jquery.mwExtension', function () { var hidefirstheading = $( '#smw-hide-firstheading' ); if ( hidefirstheading.length ) { // Hide firstHeading $( '#content' ).find( '#firstHeading' ).hide(); } } ); /** * Tab/Panel right slide * @author mwjames */ $("#panel-tab").click( function (event) { event.stopPropagation(); showIfNotVisible( "#panel-content" ); } ); function showIfNotVisible( element ) { var width = $( '#panel' ).find( 'table').width() + 8; if ( $(element).css( "width" ) == width + 'px' ) $(element).animate( { width: 4 }, 1500); else $(element).animate( { width: width }, 1500); }; $( function() { var element = $("#panel-content"), status = element.attr( 'class' ), width = element.find( 'table').width() + 8; if ( status === 'close' ){ element .width( width ) .animate( { width: 4 }, 1200); } else { element .width( width ); } } ); /** * Modified bootstrap class for tables */ importStylesheet('MediaWiki:Bootstrap.css'); /** * Additional linked icon for the searchlabel of result format "feed" * * @since 1.9.0 * * @rev 1 * @author mwjames */ $( '.smw-feed-furtherresults > a' ).addClass( 'feedlink' ); /** * Prepend w3c validation url * * @since 1.9.0 * * @rev 1 * @author mwjames */ $( '.feed-validation' ).find( 'a' ) .attr( 'href','http://validator.w3.org/check?uri=http://www.semantic-mediawiki.org' + $( '.feed-validation' ).find( 'a' ).attr( 'href' ) ) .removeClass( 'feedlink' ); /* SMWAgenda */ $(function(){ $('.ag-item-read').click(function(e){ var text = $(this).parent().parent().find('.ag-item-span-text'); if($(text).height() > 30) { $(this).find('a').text('read more'); $(text).animate({'height':'30px'},250); }else{ //if($(text).height() == 30 && $(this).find('a').text() == 'less' ) { // $(this).find('a').text('read more'); // return false; //} $(text).css({'height':'auto'}); $(this).find('a').text('less') } e.preventDefault(); return false; }); $('.ag-item-read').each(function(i,v){ var text = $(this).parent().parent().find('.ag-item-span-text'); $(text).css({'height':'auto'}); $(v).hide(); }); $('.smw-promo-btn').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2013/Tutorial_day" />'); $('.smw-promo-btn2').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2013/Conference_days" />'); $('.smw-promo-btn2015f0').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2015/Tutorial_Day" />'); $('.smw-promo-btn2015f1').wrap('<a href="https://semantic-mediawiki.org/wiki/SMWCon_Fall_2015/Conference_Days" />'); }); c63bfcb5c208ebec6ebf2f0ff5792d8c785288b4 File:WigleWifi 20160310101110.kml 6 275 620 2016-03-10T18:15:21Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 EXPLICIT KNOWLEDGE 0 206 621 473 2016-03-10T21:08:07Z Eddie 1 wikitext text/x-wiki {{Glossary-Term |Glossary Term=EXPLICIT KNOWLEDGE : |- |Glossary Definition=Explicit knowledge consists of written or otherwise documented information that can be organized, applied and transferred using digital (such as computer files) or non-digital (such as paper) means. Explicit knowledge lends itself to rules, limits, and precise meanings. Examples of explicit knowledge include dictionaries, official department publications (field manuals, technical manuals, tactics, techniques, and procedures manuals, Department of the Army pamphlets) and memorandums. Explicit knowledge is primarily used to support situational awareness and shared understanding as it applies to decision making. }} 1291d686f6336ba988a70cd9522c58e5c11c4093 Property:Has area 102 161 622 370 2016-03-10T21:32:23Z Eddie 1 Eddie moved page [[Property:Has areq]] to [[Property:Has area]] without leaving a redirect wikitext text/x-wiki [[Has type::Quantity]] [[Has description::Used for property values that describe quantities, in particular physical quantities such as time or distance.]] [[Category:Lorem ipsum]] * [[Corresponds to::1 km²]] * [[Corresponds to::0.38610 sq mi]] * [[Corresponds to::1000 m²]] * [[Corresponds to::247.1054 acre]] * [[Corresponds to::988.4215 rood]] 3149176f834dceac9afcd882010a6216a2cbcd69 623 622 2016-03-10T21:40:54Z Eddie 1 wikitext text/x-wiki [[Has type::Quantity]] [[Has description::Used for property values that describe quantities, in particular physical quantities such as time or distance.]] * [[Corresponds to::1 km²]] * [[Corresponds to::0.38610 sq mi]] * [[Corresponds to::1000 m²]] * [[Corresponds to::247.1054 acre]] * [[Corresponds to::988.4215 rood]] 9a00864fead8a9a52df499d368fa46bd3fa43b76 3AN 0 276 624 2016-05-07T02:27:53Z Eddie 1 Created page with "[[File:Main.png|thumbnail]]" wikitext text/x-wiki [[File:Main.png|thumbnail]] 64afe763c2a7d9ded7516bdefe6804d99b29972b 626 624 2016-05-07T02:32:17Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] e54eb34d1eea450b1cf6f07b5a9cb68f3b52c20d 627 626 2016-05-07T02:35:13Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|frameless|center|Statitics]] 3c3bb8dde059f5de847bea45b80adcafccacabca 629 627 2016-05-07T02:42:37Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|frameless|center|Statitics]] [[File:Stats.png|framed|left]] 1bd6c616e0f5f6ab0446c0038c6140f8872c9185 631 629 2016-05-07T02:44:12Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|frameless|left|]] [[File:Stats.png|framed|left]] 814be6cba838a39881435370e6472e0c418b2674 632 631 2016-05-07T02:45:09Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|frameless|left]] [[File:Stats.png|framed|left]] 54a15fe4243301e6e23dab7d2b3a70b75d8b891b 633 632 2016-05-07T02:45:59Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|link= ]] [[File:Stats.png|framed|left]] a3b8818b35aea7dbe5f0bdcb8107080823b0851f 634 633 2016-05-07T02:48:16Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Stats1.png|framed|left]] b1947838d8d1650ba0a1dcd44a2c210561cca2aa 636 634 2016-05-07T02:49:50Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Stats1.png|none]] 9cf1b6d54564c026b125e78504b126a9a7a2f9cf 637 636 2016-05-07T03:06:34Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Stats.png|none|link]] fe1d2ccd53e418a8e6a5c27fb22093dd5b6ceb65 638 637 2016-05-07T03:07:19Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Stats1.png|none|link]] d9507585e0f1088bf234c5ab7f8dc0b5a8bc266c 639 638 2016-05-07T03:10:04Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Stat.png|none|link]] 3dc7930f913ee93c98f4c805ec8c152c8e9972ba 641 639 2016-05-07T03:25:54Z Eddie 1 wikitext text/x-wiki {{#display_map: |rectangles=36.173785232260784,-115.13840317726135:36.17173263294969,-115.14020562171936~ZAPPOS~targeting |imageoverlays=36.17353407320669,-115.13849973678589:36.172858537963286,-115.13887524604797:; 36.172174336075585,-115.13911128044128:36.17184522417899,-115.13984084129333:; 36.17377657161716,-115.13981938362122:36.173499430515335,-115.14015197753906:; 36.17345612712971,-115.13887524604797:36.17219165771609,-115.13999104499817:~ ~Target }} [[File:Main.png|thumbnail|left|link= ]] [[File:Stat.png|none|link]] 33d6e8615458a2466c3a036fa4d41d3f9291d98f 642 641 2016-05-07T03:28:53Z Eddie 1 wikitext text/x-wiki [[File:Main.png|thumbnail|left|link= ]] [[File:Statitics.png|thumbnail|center|link= ]] <br /> [[File:Stats.png|framed|left]] b4d26a3c617ff4c508de2e7efc46ddc597e3bb9d 643 642 2016-05-07T03:29:50Z Eddie 1 wikitext text/x-wiki [[File:Statitics.png|thumbnail|link= ]] [[File:Main.png|thumbnail|link= ]] <br /> [[File:Stats.png|framed|left]] 32e14a3813fffabe7276d3e84a32ea96f8ef27a9 644 643 2016-05-07T03:51:24Z Eddie 1 wikitext text/x-wiki [[File:Statitics.png|thumbnail|link= ]] [[File:Main.png|thumbnail|link= ]] <br /> [[File:Stats.png|framed|left]] <iframe width="425" height="350" frameborder="0" scrolling="no" marginheight="0" marginwidth="0" src="http://www.openstreetmap.org/export/embed.html?bbox=-115.14195442199707%2C36.169424883090656%2C-115.13777017593384%2C36.174396211189176&amp;layer=mapnik" style="border: 1px solid black"></iframe><br/><small><a href="http://www.openstreetmap.org/#map=17/36.17191/-115.13986">View Larger Map</a></small> 4b7660c7a967d458cac575e4cd043e27c17dd24d 645 644 2016-05-07T04:18:27Z Eddie 1 wikitext text/x-wiki [[File:Statitics.png|thumbnail|link= ]] [[File:Main.png|thumbnail|link= ]] [[File:Openstreets.png|left]] <br /> [[File:Stats.png|framed|left]] 952e12f49277f4a13acf21df5bd3cf26b3ca02e5 647 645 2016-05-07T04:20:13Z Eddie 1 wikitext text/x-wiki [[File:Statitics.png|thumbnail|link= ]] [[File:Main.png|thumbnail|link= ]] [[File:Openstreets.png|framed|left|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 216105ec3c67a24a4949e8984b28aa0f710d973e 649 647 2016-05-07T04:23:14Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|framed|left|link= ]] <br /> [[File:Statitics.png|link= ]] [[File:Main.png|link= ]] [[File:Stats.png|framed|left|link= ]] a675ea2699127402d640491c6ab232bf97902fb5 650 649 2016-05-07T04:26:36Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|framed|left|link= ]] <br /> [[File:Main.png|link= ]] [[File:Stats.png|framed|left|link= ]] 2ecb67ac1f5fff60efe613c4db3628552bba5342 652 650 2016-05-07T04:28:26Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|framed|left|link= ]] <br /> [[File:bigview.png|500px|link= ]] [[File:Stats.png|framed|left|link= ]] 5f260500c9fb2ded1291212604b3a5b3788a9982 File:Main.png 6 277 625 2016-05-07T02:28:41Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Statitics.png 6 278 628 2016-05-07T02:35:50Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Stats.png 6 279 630 2016-05-07T02:43:00Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 640 630 2016-05-07T03:10:55Z Eddie 1 Eddie uploaded a new version of [[File:Stats.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Stats1.png 6 280 635 2016-05-07T02:48:34Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Openstreets.png 6 281 646 2016-05-07T04:18:44Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 648 646 2016-05-07T04:22:05Z Eddie 1 Eddie uploaded a new version of [[File:Openstreets.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Bigview.png 6 282 651 2016-05-07T04:27:33Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 3AN 0 276 653 652 2016-05-07T04:29:19Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|500px|framed|left|link= ]] [[File:bigview.png|500px|framed|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 699396f368dc4d89f0bc75765fb5b85a4981d77b 654 653 2016-05-07T04:30:07Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|500px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 68634cfef8240e8430a665fbc0d5ccea7c2e1ae4 655 654 2016-05-07T04:30:35Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|300px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 881628208af4ac421cfda85fd4f9fa2b5d39c63a 656 655 2016-05-07T04:30:54Z Eddie 1 wikitext text/x-wiki [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 13dce6886378958448a05fb0afa5cf13d0315d35 658 656 2016-05-07T04:38:37Z Eddie 1 wikitext text/x-wiki [[Ssid-NAME.numbers|SSID NAME NUMBERS]] [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] 9926900cceb6f9e844c3678b0dcb4b8731aab7e8 660 658 2016-05-07T06:09:12Z Eddie 1 wikitext text/x-wiki [[File:WigleWifi 20160507010052.kml]] [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] c9ea85a07d2ac6d7a0611f00067205f1f093c3fb 663 660 2016-05-07T06:12:21Z Eddie 1 wikitext text/x-wiki [[File:WigleWifi 20160507010052.kml]] [[File:Wifi 20160507010033.csv]] [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] e19372e35a9182fa7d2ffd3807057782146ede57 664 663 2016-05-07T06:14:24Z Eddie 1 wikitext text/x-wiki [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> [[File:Stats.png|framed|left|link= ]] e5a9600f2fd25f2a1b3cda6b74acfaf20118203a 665 664 2016-05-07T06:15:47Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|framed|left|link= ] <br /> [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> be102824d415afe39ceb194dad96199a1acea868 666 665 2016-05-07T06:16:14Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|framed|left|link= ]] <br /> [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> 2e91806c3504f4334f6c0819ca4dd86ab57e2a9e 667 666 2016-05-07T06:16:58Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|framed|link= ]] <br /> [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> bc0513518956713fe6bf3c91dc2ac7deb8324228 668 667 2016-05-07T06:17:36Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|framed|left|link= ]] <br /> [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> 2e91806c3504f4334f6c0819ca4dd86ab57e2a9e 669 668 2016-05-07T06:18:28Z Eddie 1 wikitext text/x-wiki [[IMG:Stats.png|framed|left|link= ]] <br /> [[File:WigleWifi 20160507010052.kml|KML ]] <br /> [[File:Wifi 20160507010033.csv|CSV ]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> 1885c143e3e4abb6066b4f37e04facdb79335e31 670 669 2016-05-07T06:19:31Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> 8cff5592fbc396e6260786370fb07040f44b3f4f 671 670 2016-05-07T06:20:56Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:bigview.png|500px|link= ]] <br /> 373a64ec833006f4bb38190a223c69a01f13c24a 673 671 2016-05-07T07:14:24Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:Http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg|thumbnail]] [[File:bigview.png|500px|link= ]] <br /> b86c2cbba2b8597d72b802ba6eb8046db583e0ef 674 673 2016-05-07T07:15:05Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[Http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg]] [[File:bigview.png|500px|link= ]] <br /> 96d450dc4129b8f2f8553f5a8be64fb158251db6 675 674 2016-05-07T07:18:30Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[File:http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg]] [[File:bigview.png|500px|link= ]] <br /> 841e08da135c54744ee738a48fc3cc5ed124b9f3 676 675 2016-05-07T07:19:01Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [[http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg]] [[File:bigview.png|500px|link= ]] <br /> 720cd858897488d04f2ed8479416f1dadb488788 677 676 2016-05-07T07:19:33Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> 79dc8ad4c3c48d3cc79c305f2025690b6e84eb86 682 677 2016-05-07T15:06:40Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> cee712cf0702682d061a9e66a0dcc664a1f069a9 683 682 2016-05-07T15:08:12Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 954cac5b9d0c114a0266a91b91e039c2f86316ff 688 683 2016-05-07T15:11:11Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap6.png zap7.png </gallery> <gallery> Zap4.png Zap5.png Zap2.png Zap3.png </gallery> 9760ca92e83649a67d8ca59ebee6e6c487df10c8 689 688 2016-05-07T15:12:34Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wifi 20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 954cac5b9d0c114a0266a91b91e039c2f86316ff 691 689 2016-05-07T18:34:14Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:WigleWifi 20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|400px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 191dd08e01361b7b26fa5264d7f2fe980db5d8a3 693 691 2016-05-07T18:36:20Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 0ab8c07ddacc10db724a6f1e5dc6eead8059c39a 694 693 2016-05-07T18:37:04Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|500px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> fe531ff064ba549ed5e12c2c0acef20508c3454f 695 694 2016-05-07T18:37:37Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] [http://www.reachback.io/wiki/images/thumb/4/41/Screen.jpg/437px-Screen.jpg] [[File:bigview.png|300px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 67129857349d112e8369fb612ec640f9a759a465 696 695 2016-05-07T18:38:34Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] <br /> <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> d14df916fcc43057ec90c739ee41291db0346361 697 696 2016-05-07T18:39:18Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] <br /> --- <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 3bf19784ef9c1242487e71ba2ce369d6d911792b 698 697 2016-05-07T18:40:19Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] <br /> == Screenshots == <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> fecacf2841297adc3248aa79d900deef375f8e12 699 698 2016-05-07T18:41:13Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] {{Newpara}} == Screenshots == <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 8d3ab77f27956aed94b8af9bb519b89628a8a378 700 699 2016-05-07T18:41:55Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] {{NEWPARAGRAPH}} == Screenshots == <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 99e49fd01a422d12523d804ef3962c062aaeb2ce 701 700 2016-05-07T18:43:02Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|left|link= ]] <br /> [[File:bigview.png|300px|link= ]] {{Para}} == Screenshots == <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 440433ef0784b47e5249835e6d3dd9ffcfb99e52 702 701 2016-05-07T18:44:54Z Eddie 1 wikitext text/x-wiki [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:bigview.png|300px|link= ]] [[File:Openstreets.png|300px|link= ]] {{Para}} <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 0cedfbfdcb13ccaa6b4d3414d2981f3d5f069ed0 File:Ssid-NAME.numbers 6 283 657 2016-05-07T04:37:32Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Geo20160507010052.kml 6 284 659 2016-05-07T06:07:45Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 692 659 2016-05-07T18:35:16Z Eddie 1 Eddie moved page [[File:WigleWifi 20160507010052.kml]] to [[File:Geo20160507010052.kml]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Wireless20160507010033.csv 6 285 661 2016-05-07T06:10:19Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 662 661 2016-05-07T06:10:57Z Eddie 1 Eddie moved page [[File:WigleWifi 20160507010033.csv]] to [[File:Wifi 20160507010033.csv]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 690 662 2016-05-07T18:33:07Z Eddie 1 Eddie moved page [[File:Wifi 20160507010033.csv]] to [[File:Wireless20160507010033.csv]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Screen.jpg 6 286 672 2016-05-07T07:12:23Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap0.png 6 287 678 2016-05-07T15:01:37Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap1.png 6 288 679 2016-05-07T15:02:11Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap2.png 6 289 680 2016-05-07T15:02:49Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap3.png 6 290 681 2016-05-07T15:03:18Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap4.png 6 291 684 2016-05-07T15:08:55Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap5.png 6 292 685 2016-05-07T15:09:24Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap6.png 6 293 686 2016-05-07T15:09:50Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Zap7.png 6 294 687 2016-05-07T15:10:11Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 3AN 0 276 703 702 2016-05-07T18:46:16Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:bigview.png|300px|link= ]] [[File:Openstreets.png|300px|link= ]] {{Para}} <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 206415caab1fb1500891e2a7affe9935f50992a9 704 703 2016-05-07T18:47:19Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px|link= ]] [[File:bigview.png|300px|link= ]] {{Para}} <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> 383f3d2c7e369a07a3d01a622879cea3e77e5f64 705 704 2016-05-07T18:53:09Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Stats.png|330px|border|link= ]] <br /> [[File:Geo20160507010052.kml ]] <br /> [[File:Wireless20160507010033.csv]] <br /> [[File:Openstreets.png|300px]] [[File:bigview.png|300px]] {{Para}} <gallery> zap0.png zap1.png zap2.png zap3.png </gallery> <gallery> Zap4.png Zap5.png Zap6.png Zap7.png </gallery> bf09f67b314e60c09dc44e87c45e8e769861f9ae POS 0 295 706 2016-06-15T23:13:49Z Eddie 1 Created page with "[[File:Gen-char-scrapers.png|thumbnail]]" wikitext text/x-wiki [[File:Gen-char-scrapers.png|thumbnail]] 45b963966e9c87d07658a422d0dd135cffe85507 708 706 2016-06-15T23:16:18Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-scrapers.png|link= ]] 4947ed8681b6d18919325bd5328d0c4c7e9f44a6 709 708 2016-06-15T23:17:36Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-scrapers.png|link= ]] <pdf>pos-ram-scraper-malware.pdf</pdf> 918f72b1fa2991919af8c66dfa047a3ed0cddf3f 711 709 2016-06-15T23:19:16Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-scrapers.png|link= ]] [[pos-ram-scraper-malware.pdf]] 9e4e679d01f076039e15e8a70e812f693627c2b2 712 711 2016-06-15T23:20:59Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-scrapers.png|link= ]] [[http://www.reachback.io/wiki/index.php?title=File:Pos-ram-scraper-malware.pdf]] f5cbc24b061cfc462c4d2ffe18edeea8ae6d3539 714 712 2016-06-15T23:23:05Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-ram-scrapers.png|link= ]] [[http://www.reachback.io/wiki/index.php?title=File:Pos-ram-scraper-malware.pdf]] 51f3a7e34c8f8cd64cde0d07a69d5ec8d2b6ae59 715 714 2016-06-15T23:24:13Z Eddie 1 wikitext text/x-wiki [[File:Gen-char-ram-scrapers.png|link= ]] [[http://www.reachback.io/wiki/index.php?title=File:Pos-ram-scraper-malware.pdf PoS RAM Scraper Malware Past, Present, and Future]] d5414dfa07f4b5b377a30462374bf6d399119ed9 716 715 2016-06-15T23:32:28Z Eddie 1 wikitext text/x-wiki Alina Dexter Pony 1.9 source [[http://cimacell.com/resrch/pos.zip]] [[File:Gen-char-ram-scrapers.png|link= ]] [[http://www.reachback.io/wiki/index.php?title=File:Pos-ram-scraper-malware.pdf PoS RAM Scraper Malware Past, Present, and Future]] a8de0cff8b741cab5557e1d72e9d1c86bfe6895d 717 716 2016-06-15T23:34:46Z Eddie 1 wikitext text/x-wiki Alina Dexter Pony 1.9 [[http://cimacell.com/resrch/pos.zip| Source Code]] [[File:Gen-char-ram-scrapers.png|link= ]] [http://www.reachback.io/wiki/index.php?title=File:Pos-ram-scraper-malware.pdf| PoS RAM Scraper Malware Past, Present, and Future] d50dc1500837035351233d65eee55271ed93e2ab File:Gen-char-scrapers.png 6 296 707 2016-06-15T23:15:29Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Pos-ram-scraper-malware.pdf 6 297 710 2016-06-15T23:18:34Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Gen-char-ram-scrapers.png 6 298 713 2016-06-15T23:22:21Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Reachback-contracts-in-ricc.png 6 299 718 2016-06-15T23:40:58Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 SocialMediaSensors 0 300 719 2016-06-23T10:51:17Z Eddie 1 Created page with "<nowiki> '''Well built library of valuable resources''' The social media sensors (monitors) provided here a compiled list of the firm or supplier and the end prediction...." wikitext text/x-wiki <nowiki> '''Well built library of valuable resources''' The social media sensors (monitors) provided here a compiled list of the firm or supplier and the end prediction. * Social360  Custom monitoring and reporting systems  All  www.social360monitoring.com  Paid  USA / UK / All  www.social360monitoring.com  * BrandReact, Inc  Social Media Monitoring, Reporting & Response  All: Blogs, News Sites, Consumer Sites (Radar, Kieskeurig etc), Review Sites (Yelp, Travelocity), Social Media (Facebook, Twitter, LinkedIn, YouTube, Orkut, Hyves, etc)  http://BrandReact.net/brand  Paid  USA/Netherlands/Brasil  Dick Raman  * iSentia Brandtology  1-Social and Social Express  All  http://www.brandtology.com  Paid  USA, China, Hong Kong, Taiwan, Japan, Korea, Australia, Singapore, Malaysia, Indonesia, Thailand, Vietnam, India, New Zealand, Mexico, Brazil, France, Russia, Germany, Portugal, UK, Middle East  Kelly Choo  * BrandProtect  Social Media Monitoring, Reporting & Incident Response Experts  ALL  BrandProtect  Paid  USA / Canada / UK  Greg Barrow  * Needium  Needium  Twitter  http://needium.com/  Paid  USA, Canada, France, UK, more  Sylvain Carle  * Dishy! AG  ReputationTool  All  http://reputationtool.com  Paid  USA, Canada, Europe, Australia  Ken Burbary  * Internet911  Social Media: Understanding & Protecting your Online Reputation for SMBs  ALL  Internet911  Paid  USA / Canada  Greg Barrow  * Actionly  Actionly  Twitter, Facebook, Blogs, YouTube, Buzz, Flickr  http://www.actionly.com  Paid  USA  Actionly  * Ascent Labs, Inc.  StatsMix  All  http://statsmix.com/  Free  USA  Sasha Kovaliov  * Asterisq  Mentionmap  Twitter  http://apps.asterisq.com/mentionmap/#  Free  USA  Bob Hodgson  * Attensity  Market Voice  All  http://www.attensity.com  Paid  USA  Ken Burbary  * Backtype  Connect  Blogs, Twitter, Friendfeed  http://www.backtype.com/connect  Free  USA  Ken Burbary  * Bantam Networks  Bantam Live  Twitter  http://www.bantamlive.com/  Paid  USA  Bob Hodgson  * Betaworks  Chartbear  Twitter  http://www.chartbeat.com  Paid  USA  Nathan Folkman  * BitConfused  BuzzDing  All  http://www.buzzding.com  Paid  USA  Ken Burbary  * Bivings Group  Impactwatch  All  http://impactwatch.com  Paid  USA  Dave Murr  * Biz360 Inc.  Biz360  All  Biz360  Paid  USA  Len Kendall  * Buzzersation  Buzzersation  All  http://www.buzzersation.com  Paid  USA  Ken Burbary  * Buzzient  Buzzient Enterprise  All  http://www.buzzient.com  Paid  USA  Ken Burbary  * BuzzLogic  BuzzLogic Insight  All  http://www.buzzlogic.com  Paid  USA  Ken Burbary  * BuzzStream  BuzzStream  All  http://www.buzzstream.com  Free  USA  Ed Hartigan  * ChatterBeacon  ChatterBeacon  Facebook  http://chatterbeacon.com  Free  USA  Ken Burbary  * Cision  Cision Social Media  All  http://us.cision.com/products_services/cision_social_media/overview.asp  Paid  USA  Ken Burbary  * Collecta  Collecta  Micromedia, Blogs, Video  Collecta.com  Free  USA  Len Kendall  * Collective Intellect  CI:View and CI:Insight  All  http://www.collectiveintellect.com  Paid  USA  Ken Burbary  * Converseon  Conversation Miner  All  http://www.converseon.com  Paid  USA  Ken Burbary  * Conversition  TweetFeel  Twitter  TweetFeel  Free  USA  Len Kendall  * CoTweet  CoTweet  Twitter  http://www.cotweet.com  Free  USA  Ed Hartigan  * Crimson Hexagon  Voxtrot  All  http://www.crimsonhexagon.com  Paid  USA  Jay Baer  * Crowd Favorite  Addictomatic  All  http://addictomatic.com  Free  USA  Michelle Sullivan  * CustomScoop  BuzzPerception  Blogs  http://www.customscoop.com  Paid  USA  Chip Griffin  * CustomScoop  ClipIQ  All  http://www.customscoop.com  Paid  USA  Chip Griffin  * Cymfony  Maestro  All  http://www.cymfony.com  Paid  USA  Ken Burbary  * Cyveillance  Cyveillance  All  http://www.cyveillance.com  Paid  USA  Ken Burbary  * Decooda  Decooda  All  http://decooda.com  Paid  USA  Ken Burbary  * Digimind  Digimind Meta-Search  All  http://www.digimind.com  Paid  USA  Ken Burbary  * Dow Jones  Dow Jones Insight  All  http://solutions.dowjones.com  Paid  USA  Ken Burbary  * eCairn  Conversation  All  http://www.ecairn.com  Paid  USA  Ken Burbary  * Echometrix  ThePulse  All  http://www.echometrix.com  Paid  USA  Adam Smilowitz  * Effyis  Boardreader  Forums  http://boardreader.com  Free  USA  Ken Burbary  * Emerge Technology Group  Socialscape  All  http://www.socialscape.biz  Paid  USA  Ken Burbary  * EvoApp  EvoApp  All  http://www.evoapp.com  Paid  USA  Ken Burbary  * Facebook  Search  Facebook  http://www.facebook.com/search  Free  USA  Ken Burbary  * Facebook  Lexicon  Facebook  http://www.facebook.com/lexicon  Free  USA  Ken Burbary  * Glam Media  Tinker  Twitter  http://www.tinker.com  Free  USA  Ken Burbary  * Google  Blogsearch  Blogs  http://blogsearch.google.com  Free  USA  Ken Burbary  * GroupHigh  GroupHigh  Blogs  http://www.grouphigh.com  Paid  USA  Ken Burbary  * Hubspot  Twitter Grader  Twitter  Twitter Grader  Free  USA  Len Kendall  * Infegy  Social Radar  All  Social Radar  Paid  USA  Len Kendall  * Inifinimedia  StartPR  All  http://startpr.com  Paid  USA  Ken Burbary  * Insttant  Insttant  Twitter  http://insttant.com  Paid  USA  http://www.kenburbary.com  * Iterasi  Positive Press  All  http://www.iterasi.net  Paid  USA  Ken Burbary  * JD Power  Umbria  All  http://www.jdpowerwebintelligence.com  Paid  USA  Ken Burbary  * Jive Software  Jive Social Media Engagement  All  http://www.jivesoftware.com  Paid  USA  Ken Burbary  * Kaleidico  Eavesdropper  All  http://kaleidico.com  Paid  USA  Ken Burbary  * Kantar Video  Videolytics  Video  http://www.kantarvideo.com  Paid  USA  Ken Burbary  * Klout  Klout  Twitter  http://klout.com  Free  USA  Benjamin Schwarz  * Linkfluence  Linkfluence  All  http://linkfluence.net  Paid  USA  Ken Burbary  * ListenLogic  Resonate  All  http://www.listenlogic.com  Paid  USA  Ken Burbary  * Lithium Technologies  Lithium Social Media Monitoring  All  http://www.lithium.com  Paid  USA  Ken Burbary  * Looxii  Looxii  Social Media  http://www.looxii.com/  Paid  USA  Alex Griffiths  * Loudpixel  Loudpixel  http://loudpixel.com/  Paid  USA  Alex Griffiths  * Martiz Research  Evolve24  The Mirror  http://www.evolve24.com  Paid  USA  Ken Burbary  * Medimix  Scanbuzz  All (niche - pharma)  http://www.medimix.net/  Paid  USA  Ed Hartigan  * Meltwater  Buzz  All  http://www.meltwater.com  Paid  USA  Ken Burbary  * Meltwater Group  BuzzGain  All  BuzzGain  Paid  USA  Christine Fife  * Meltwater Group  Icerocket  Blogs  http://www.icerocket.com  Free  USA  Ken Burbary  * Meltwater Group  JitterJam  All  http://www.jitterjam.com/  Paid  USA  E. Christopher Clark  * Milestone Internet Marketing  eBuzz Connect  All  http://www.ebuzzconnect.com/  Paid  USA  Mike Supple  * Monitter  Monitter  Twitter  http://www.monitter.com  Free  USA  Ken Burbary  * Moreover Technologies  Newsdesk  All  http://w.moreover.com  Paid  USA  Ken Burbary  * MotiveQuest  MotiveQuest  All  http://www.motivequest.com  Paid  USA  Ken Burbary  * mReplay  Livedash  All  http://www.livedash.com  Free  USA  Ken Burbary  * NetBase  ConsumerBase  All  http://www.netbase.com  Paid  USA  Ken Burbary  * Networked Insights  SocialSense  All  http://www.networkedinsights.com  Paid  USA  Ken Burbary  * New Media Strategies  AIM  All  http://newmediastrategies.net  Paid  USA  Ken Burbary  * Nielsen  Blogpulse  Blogs  http://www.blogpulse.com  Free  USA  Ken Burbary  * Nielsen  My BuzzMetrics  All  http://en-us.nielsen.com/tab/product_families/nielsen_buzzmetrics  Paid  USA  Ken Burbary  * Now Metrix  Trendrr  All  http://www.trendrr.com  Free  USA  Ken Burbary  * NutShellMail  NutShellMail  Social Networks  http://nutshellmail.com  Free  USA  Ken Burbary  * OneRiot  OneRiot  Twitter, Digg, YouTube  http://www.oneriot.com  Free  USA  Ed Hartigan  * Overdrive Interactive  Social Media Dashboard  All  http://www.ovrdrv.com  Paid  USA  Jeff Selig  * Overtone  Open Mic  All  http://www.overtone.com  Paid  USA  Ed Hartigan  * PeopleBrowsr  Analytic.ly  All  http://analytics.peoplebrowsr.com  Paid  USA  Ken Burbary  * Pidgin Technologies  Boardtracker  Forums  http://www.boardtracker.com  Free  USA  Ken Burbary  * Position2  Brand Monitor  All  Position2 Brand Monitor  Paid  USA  Position2  * PR Newswire  eWatch  Blogs  http://ewatch.prnewswire.com  Paid  USA  Ken Burbary  * Raven  Raven  All  Raven SEO Tools  Paid  USA  Roy Morejon  * Reputation Defender  Reputation Defender  All  http://www.reputationdefender.com  Paid  USA  Ken Burbary  * ReputationHQ  My Reputation Manager  All  http://reputationhq.com  Paid  USA  Ken Burbary  * Reputationobserver  Reputationobserver  All  http://www.reputationobserver.com  Paid  USA  Sebastian  * ReviewIQ  ReviewIQ  All  http://www.reviewiq.net  Paid  USA  Ken Burbary  * Revinate  Revinate  All  http://www.revinate.com  Paid  USA  Ken Burbary  * RightNow  RightNow CX  All  http://www.rightnow.com/  Paid  USA  Alex Griffiths  * Samepoint  Samepoint  All  http://www.samepoint.com  Free  USA  Ken Burbary  * Sensidea  SocialSeek  Blogs, Video, Micromedia, Photos  SocialSeek  Free  USA  Len Kendall  * SiteQuest Technologies  Compliance WatchDog  All  http://www.sitequesttech.com  Paid  USA  Ken Burbary  * Social Mention  Social Mention  All  http://socialmention.com  Free  USA  Ken Burbary  * SocialOomph  SocialOomph  Twitter  SocialOomph  Free  USA  Jason Mayes  * Spiral16  Spark  All  http://www.spiral16.com  Paid  USA  Ken Burbary  * Sports Media Challenge  Buzz Manager   All  http://www.sportsmediachallenge.com/buzzmanager/index.html  Paid  USA  Ryan Stephens  * Sprinklr  Sprinklr  Twitter and Facebook  http://www.sprinklr.com/  Paid  USA  Christine Fife  * Sprout Social  Sprout Social  All  http://sproutsocial.com/  Paid  USA  Alex Griffiths  * SWIX  SWIX  All  http://swixhq.com/SWIX.html  Paid  USA  Sasha Kovaliov  * Tealium  Tealium SM  All  http://www.tealium.com/products/social-media/index.html  Paid  USA  Tony Felice  * Technorati  Blogsearch  Blogs  http://technorati.com  Free  USA  Ken Burbary  * Techrigy  SM2  All  http://www.alterian-social-media.com  Paid  USA  Ken Burbary  * Telligent  Telligent Analytics  All  http://telligent.com/products/telligent_analytics/  Paid  USA  Peter Brenchley  * The Search Monitor  The Search Monitor (Starter and Pro)  All  http://www.thesearchmonitor.com/  Free  USA  Christine Fife  * TipTop Technologies  TipTop  Twitter, Amazon reviews  http://feeltiptop.com  Free  USA  Ken Burbary  * Todaypulse  Todaypulse  All  http://todaypulse.com  Paid  USA  Justin Walsh  * Topsy Labs  Topsy  Twitter  http://topsy.com/  Free  USA  Christine Fife  * Trackur LLC.  Trackur  All  Trackur  Paid  USA  Roy Morejon  * Twazzup  Twazzup  Twitter  http://www.twazzup.com  Free  USA  Ken Burbary  * TweetBeep  TweetBeep  Twitter  http://www.tweetbeep.com  Free  USA  Michael Jensen  * Tweetlytics  Tweetlytics  Twitter  http://www.tweetlytics.com/  Paid  USA  Alex Griffiths  * TweetReach  TweetReach  Twitter  TweetReach  Free  USA  Jason Mayes  * Twitter  Twitter Search  Twitter  http://search.twitter.com  Free  USA  Ken Burbary  * TwitterCounter  TwitterCounter  Twitter  TwitterCounter  Free  USA  Jason Mayes  * Viralheat  Viralheat  All  http://www.viralheat.com  Paid  U.S.A  Greg  * Visible Measures  TruReach, Video Engagement  Video  http://www.visiblemeasures.com  Paid  USA  Pierre-Loïc Assayag  * Visible Technologies  Visible Intelligence  All  http://www.visibletechnologies.com  Paid  USA  Ken Burbary  * Vocus, Inc.  Vocus PR  All  http://www.vocus.com/content/social-media.asp  Paid  USA  Ken Burbary  * Web Analytics Demystified  Twitalyzer  Twitter  http://www.twitalyzer.com  Free  USA  Ken Burbary  * Who's Talkin  Who's Talkin  ALL  Who's Talkin  Paid  USA  Roy Morejon  * Wildfire  Monitor  Twitter, Facebook  http://monitor.wildfireapp.com  Free  USA  Ken Burbary  * Wool.Labs  WebDig, DigTV, AdSlider  All Internet + TV/Radio  http://woollabs.com  Paid  USA  Steve Chiles  * Xerocity Design Group  twitt(url)y  Twitter  http://twitturly.com/  Free  USA  Claudius Gerstner  * YackTrack  YackTrack  Blogs  http://yacktrack.com  Free  USA  Rob Diana  * MutualMind  MutualMind  All  http://mutualmind.com  Paid  US  Babar Bhatti  * Geofeedia  Geofeedia  Twitter, Instagram, Fickr, Picasa, YouTube  http://www.geofeedia.com  Paid  United States  Ken Burbary  * Social Agency Inc  SpredFast  All  http://spredfast.com  Paid  United States  Ken Burbary  * Social Report  Social Report  All  https://www.socialreport.com  Paid  United States  Ken Burbary  * DigitalMR   Social Nuggets  All  http://www.digital-mr.com  Paid  UK, USA, Cyprus  Michalis A. Michael  * Integrasco AS  WoMPortal   All  Integrasco  Paid  UK, Norway, China  Integrasco  * 1000Heads  WOMTrak  All  http://www.1000heads.com  Paid  UK  Ken Burbary  * Brandwatch  Brandwatch  All  http://www.brandwatch.net  Paid  UK  Fabrice Retkowsky  * Inuda Innovations  HowSociable  All  http://howsociable.com/  Free  UK  Christine Fife  * Macranet  Sentiment Metrics  All  http://www.sentimentmetrics.com  Paid  UK  Ed Hartigan  * Market Sentinel  LiveBuzz  All  http://www.marketsentinel.com/  Paid  UK  Christine Fife  * MediaBadger  Mediasphere360  All  http://www.mediabadger.com  Paid  UK  Ken Burbary  * Noteca  Noteca  All  http://www.noteca.com  Paid  UK  Ken Burbary  * Onalytica  Direct Access - InfluenceMonitor  All  http://www.onalytica.com  Paid  UK  Ken Burbary  * Rees Bradley Hepburn Ltd  RBH Radar  All  http://www.rbh.co.uk  Paid  UK  Ken Burbary  * Simpleweb Ltd.  Media Genius  All  http://www.mediageniusapp.com  Paid  UK  Ken Burbary  * Sodash  Sodash  Twitter, Facebook, email, specific blogs via RSS  soda.sh/  Paid  UK  Alex Griffiths  * Tick Tock Boom Digital  BoomSonar  All  http://www.boomsonar.com  Paid  Turkey  Ken Burbary  * FinchLine  FinchLine  All  http://www.finchline.nl  Paid  The Netherlands  Ken Burbary  * New Music Labs BV  Tribe Monitor  Online (MySpace, Hyves, Last.fm, Twitter, Google Analytics, FaceBook, Google Video, Youtube)  Tribe Monitor  Free  The Netherlands  New Music Labs  * MeMo News AG  MeMo News Monitoring  All: News, Blogs, Forums, Social Media (Facebook, Twitter, Google+, Youtube ...)  MeMoNews.com  Paid  Switzerland  Stefan Vetter  * Netbreeze  CommMonitor  All  http://www.netbreeze.ch  Paid  Switzerland  Ken Burbary  * Intelliwell  Informant  All  http://informant.se  Paid  Sweden  Ken Burbary  * Patch6 AB  Silverbakk Briefing Room  All  http://www.silverbakk.com  Paid  Sweden  Ken Burbary  * Retriever   Retriever  Blogs, Twitter, Facebook  http://www.retriever.se  Paid  Sweden  Ken Burbary  * Cierzo Development S.L  Smmart  All  http://www.smmart.es  Paid  Spain  Ken Burbary  * Habber tec  Social Web Intelligence  All  http://socialwebintelligence.com  Paid  Spain  Ken Burbary  * Tinval Sistemes S.L.  BrandChats  All  http://www.brandchats.com  Paid  Spain  * WhatHashtag by Círculo Rojo  WhatHashtag  Twitter  http://whathashtag.circulorojo.es/  Free  Spain  Álex Rubio @alexrbn (Círculo Rojo)  * Daumsoft  UCCmetrics  All  http://www.daumsoft.com  Paid  South Korea  Ken Burbary  * Brands Eye  Brands Eye  All  http://www.brandseye.com  Paid  South Africa  Ken Burbary  * ThoughtBuzz  ThoughtBuzz  All  http://www.thoughtbuzz.net  Paid  Singapore, Malaysia, Philippines, Indonesia   * JamIQ  JamIQ  All  http://www.jamiq.com  Paid  Singapore  * YouScan  YouScan  All  http://www.youscan.ru  Paid  Russia, Ukraine  Alexey Orap  * TreeWorks  Zelist Monitor  Blogs, Twitter, online media, Facebook, some of the most important discussion boards/forums in Romania  http://www.zelistmonitor.ro  Paid  Romania  Catalin Tenita  * BrandReact Nederland BV  Social Media Monitoring, Reporting & Response  All: Blogs, News Sites, Consumer Sites (Radar, Kieskeurig etc), Review Sites (Yelp, Travelocity), Social Media (Facebook, Twitter, LinkedIn, YouTube, Orkut, Hyves, etc)  BrandReact.NL  Paid  Netherlands, Belgium, Luxemburg  Dick Raman  * Clipit News  Clipit - online media monitoring  All (dutch)  http://www.clipit.nl  Paid  Netherlands  Sjaak Janssen  * iMonitoring  iMonitoring  All  http://www.internetmonitoring.nl  Paid  Netherlands  Ken Burbary  * Teezir   eCare  All  http://www.teezir.com  Paid  Netherlands  Ken Burbary  * TraceBuzz  TraceBuzz  All  http://www.tracebuzz.com  Paid  Netherlands  Ken Burbary  * Twitter Analyzer  Twitter Analyzer  Twitter  http://twitteranalyzer.com  Free  Netherlands  Claudius Gerstner  * Trendiction  Trendiction Search  All  http://www.trendiction.com  Paid  Luxembourg  Ken Burbary  * Expert System  Cognito Monitor  All  http://www.expertsystem.net  Paid  Italy, USA  Ken Burbary  * BuzzDetector  BuzzDetector  All  http://www.buzzdetector.com  Paid  Italy  Ken Burbary  * infoFactory  ifMONITOR  All  http://www.infofactory.it  Paid  Italy  Ken Burbary  * SocialPointer  Social Pointer  All  http://www.socialpointer.com  Free  Israel  Yair Benyami  * Katapedia  Katapedia  All  http://www.katapedia.com  Paid  Indonesia  Deddy Rahman  * Beevolve  Social Media Monitoring & Engagement Platform  All  http://www.beevolve.com/  Paid  India  Christine Fife  * Factualz  Factualz  All  http://www.factualz.com  Paid  India  Ken Burbary  * Omllion  Omllion  All  http://www.omllion.com  Paid  India  Ken Burbary  * Webfluenz   Webfluenz   All  http://webfluenz.com  Paid  India  Ken Burbary  * Brandmonitor  Brandmonitor  All  http://www.brandmonitor.hu  Paid  Hungary  * Glerts  Glerts  All media indexed by Google  http://www.glerts.com/beta  Free  Global  http://www.glert.com  * Cognita AG  blueReport  Blogs, Twitter  http://www.bluereport.net  Paid  Germany, Switzerland, Austria   Ken Burbary  * Mindlab Solutions GmbH  netmind Sphere  All  http://www.mindlab.de  Paid  Germany, Austria, Switzerland  Heinz D. Schultz  * Ethority  Gridmaster  All  http://www.ethority.net  Paid  Germany  Ken Burbary  * Frank Westphal  Rivva  Blogs, Twitter  http://rivva.de/  Free  Germany  Claudius Gerstner  * iMooty  iMooty  News  http://www.imooty.eu  Free  Germany  Ken Burbary  * infospeed  web2monitor™  All  infospeed  Paid  Germany  Social Media Magazin  * Landau Media  Landau Media Monitoring Internet  All  http://www.landaumedia.de  Paid  Germany  Ken Burbary  * net-clipping  net-clipping  Online, Social Media, amazon, facebook  http://net-clipping.de  Paid  Germany  Cornelia Horst  * New Communication  Reputation Control  All  http://www.reputation-control.de  Paid  Germany  * TwentyFeet  TwentyFeet  Twitter, Facebook, YouTube, Google Analytics, bit.ly, MySpace  http://www.twentyfeet.com  Paid  Germany  Paul Herwarth  * User Interface Design GmbH  What's Up?!  Twitter  http://whatsup.uid.com  Free  Germany  Ken Burbary  * Webbosaurus  Webboboard  All  webbosaurus.de  Paid  Germany  Webbosaurus  * AT Internet  BuzzWatcher  All  http://en.atinternet.com  Paid  France  Ken Burbary  * AT Internet  BuzzWatcher  All  http://en.atinternet.com/Products/BuzzWatcher.aspx  Paid  France  Ken Burbary  * Semiocast  Semioboard  All  Semioboard.com  Paid  France  Jean-Charles Campagne  * Statsit   Monitor  All  http://www.statsit.com  Paid  Finland, Malaysia  Ken Burbary  * M-Brain  M-Brain  All  http://www.m-brain.com/  Paid  Finland  Joakim Nyberg  * Whitevector  Whitevector  All  http://www.whitevector.com  Paid  Finland  Ken Burbary  * Blogmeter  Blogmeter  All  http://www.blogmeter.eu  Paid  Europe  Barbara Aversano  * Replise  Replise  All  Replise.com  Paid  Europe  * Socialware  Asomo  All  http://www.asomo.net  Paid  Europe  Ken Burbary  * Synthesio  Synthesio  All  Synthesio  Paid  Europe  Len Kendall  * BrandMetric  BrandMetric  All  http://www.brandmetric.com  Paid  Chile  Ken Burbary  * DNA13  dnaMonitor  All  http://www.dna13.com/  Paid  Canada  Christine Fife  * Lola  Variety of off-the-shelf tools and proprietary technologies  All online sources  Lola  Paid  Canada  Luis Vieira  * MediaMiser  MediaMiser Enterprise  All  http://www.mediamiser.com  Paid  Canada  Ken Burbary  * MyFrontSteps  Steprep  All  http://steprep.myfrontsteps.com  Free  Canada  Ken Burbary  * PostRank Inc  PostRank  RSS Enabled Content, Blogs, Social Networks & Hubs  PostRank  Free  Canada  PostRank  * RepuMetrix  RepuTrace, RepuTrack  All  http://www.repumetrix.com  Paid  Canada  Ken Burbary  * Salesforce  Radian6  All  http://www.radian6.com  Paid  Canada  Ken Burbary  * Syncapse Corp  Socialtalk  Twitter, Facebook, Wordpress, Moveable Type  http://www.socialtalk.com  Paid  Canada  Alex Griffiths  * Sysomos  MAP, Heartbeat  All  http://www.sysomos.com  Paid  Canada  Ken Burbary  * White Noise Inc.  White Noise  All  http://www.herdthenoise.com  Paid  Canada  Ken Burbary  * Chleba Agencia digital  Social media Monitor  Google Blogs / Flickr / Twitter / Google News / Yahoo Respostas / Facebook / Orkut Comunidades / Reclame Aqui / YouTube   http://www.socialmediamonitor.com.br/  Paid  Brazil  Henrique Rangel  * Scup  Scup  All  http://www.scup.com.br  Paid  Brazil  Ken Burbary  * Attentio  Buzz Report  All  http://www.attentio.com  Paid  Belgium  Simon McDermott  * BrandFractal   CommandCenter, Sodalyzer, social data analytics  All  http://www.brandfractal.com  Paid  Belgium  Ken Burbary  * Engagor  Engagor Insights  All  http://www.engagor.com  Paid  Belgium  Ken Burbary  * BuzzNumbers  BuzzNumbers  All  http://www.buzznumbershq.com  Paid  Australia  Ken Burbary  * e-CBD  Dialogix  All  http://www.dpdialogue.com.au  Paid  Australia  Ken Burbary  * StreamWall  StreamWall  All  http://www.socialmediamonitoring.com.au  Paid  Australia  Ken Burbary  * Walkley  Walkley  All  http://www.walkley.com.au/  Paid  Australia  Walkley  * Flaptor  Trendistic (formerly Twist)  Twitter  http://trendistic.com  Free  Argentina  Claudius Gerstner  * SocialMetrix  SocialMetrix  All  http://www.SocialMetrix.com  Paid  Argentina  Sebastian Rosenfeld  * Buzzcapture B.V.  Buzzcapture  All  http://www.buzzcapture.com  Paid  Amsterdam  Ken Burbary  * Eurospider Information Technology AG  Media Monitoring & Management  All  Media Monitoring &amp; Management  Paid  All  Loig Roumois  * uberVU  uberVU  blogs, Twitter, Digg, FriendFeed and many more  http://www.ubervu.com/  Free  Bryan Skelton  * WhoUnfollowedMe  WhoUnfollowedMe  Twitter  WhoUnfollowedMe  Free  Jason Mayes  286116290a2feab2ce5e6a9f54691e6406742feb 726 719 2016-06-30T02:00:16Z Eddie 1 wikitext text/x-wiki ''Well built library of valuable resources''' The social media sensors (monitors) provided here a compiled list of the firm or supplier and the end prediction. * * Social360  Custom monitoring and reporting systems  All  www.social360monitoring.com  Paid  USA / UK / All  www.social360monitoring.com  * * BrandReact, Inc  Social Media Monitoring, Reporting & Response  All: Blogs, News Sites, Consumer Sites (Radar, Kieskeurig etc), Review Sites (Yelp, Travelocity), Social Media (Facebook, Twitter, LinkedIn, YouTube, Orkut, Hyves, etc)  http://BrandReact.net/brand  Paid  USA/Netherlands/Brasil  Dick Raman  * * iSentia Brandtology  1-Social and Social Express  All  http://www.brandtology.com  Paid  USA, China, Hong Kong, Taiwan, Japan, Korea, Australia, Singapore, Malaysia, Indonesia, Thailand, Vietnam, India, New Zealand, Mexico, Brazil, France, Russia, Germany, Portugal, UK, Middle East  Kelly Choo  * * BrandProtect  Social Media Monitoring, Reporting & Incident Response Experts  ALL  BrandProtect  Paid  USA / Canada / UK  Greg Barrow  * * Needium  Needium  Twitter  http://needium.com/  Paid  USA, Canada, France, UK, more  Sylvain Carle  * * Dishy! AG  ReputationTool  All  http://reputationtool.com  Paid  USA, Canada, Europe, Australia  Ken Burbary  * * Internet911  Social Media: Understanding & Protecting your Online Reputation for SMBs  ALL  Internet911  Paid  USA / Canada  Greg Barrow  * * Actionly  Actionly  Twitter, Facebook, Blogs, YouTube, Buzz, Flickr  http://www.actionly.com  Paid  USA  Actionly  * * Ascent Labs, Inc.  StatsMix  All  http://statsmix.com/  Free  USA  Sasha Kovaliov  * * Asterisq  Mentionmap  Twitter  http://apps.asterisq.com/mentionmap/#  Free  USA  Bob Hodgson  * * Attensity  Market Voice  All  http://www.attensity.com  Paid  USA  Ken Burbary  * * Backtype  Connect  Blogs, Twitter, Friendfeed  http://www.backtype.com/connect  Free  USA  Ken Burbary  * * Bantam Networks  Bantam Live  Twitter  http://www.bantamlive.com/  Paid  USA  Bob Hodgson  * * Betaworks  Chartbear  Twitter  http://www.chartbeat.com  Paid  USA  Nathan Folkman  * * BitConfused  BuzzDing  All  http://www.buzzding.com  Paid  USA  Ken Burbary  * * Bivings Group  Impactwatch  All  http://impactwatch.com  Paid  USA  Dave Murr  * * Biz360 Inc.  Biz360  All  Biz360  Paid  USA  Len Kendall  * * Buzzersation  Buzzersation  All  http://www.buzzersation.com  Paid  USA  Ken Burbary  * * Buzzient  Buzzient Enterprise  All  http://www.buzzient.com  Paid  USA  Ken Burbary  * * BuzzLogic  BuzzLogic Insight  All  http://www.buzzlogic.com  Paid  USA  Ken Burbary  * * BuzzStream  BuzzStream  All  http://www.buzzstream.com  Free  USA  Ed Hartigan  * * ChatterBeacon  ChatterBeacon  Facebook  http://chatterbeacon.com  Free  USA  Ken Burbary  * * Cision  Cision Social Media  All  http://us.cision.com/products_services/cision_social_media/overview.asp  Paid  USA  Ken Burbary  * * Collecta  Collecta  Micromedia, Blogs, Video  Collecta.com  Free  USA  Len Kendall  * * Collective Intellect  CI:View and CI:Insight  All  http://www.collectiveintellect.com  Paid  USA  Ken Burbary  * * Converseon  Conversation Miner  All  http://www.converseon.com  Paid  USA  Ken Burbary  * * Conversition  TweetFeel  Twitter  TweetFeel  Free  USA  Len Kendall  * * CoTweet  CoTweet  Twitter  http://www.cotweet.com  Free  USA  Ed Hartigan  * * Crimson Hexagon  Voxtrot  All  http://www.crimsonhexagon.com  Paid  USA  Jay Baer  * * Crowd Favorite  Addictomatic  All  http://addictomatic.com  Free  USA  Michelle Sullivan  * * CustomScoop  BuzzPerception  Blogs  http://www.customscoop.com  Paid  USA  Chip Griffin  * * CustomScoop  ClipIQ  All  http://www.customscoop.com  Paid  USA  Chip Griffin  * * Cymfony  Maestro  All  http://www.cymfony.com  Paid  USA  Ken Burbary  * * Cyveillance  Cyveillance  All  http://www.cyveillance.com  Paid  USA  Ken Burbary  * * Decooda  Decooda  All  http://decooda.com  Paid  USA  Ken Burbary  * * Digimind  Digimind Meta-Search  All  http://www.digimind.com  Paid  USA  Ken Burbary  * * Dow Jones  Dow Jones Insight  All  http://solutions.dowjones.com  Paid  USA  Ken Burbary  * * eCairn  Conversation  All  http://www.ecairn.com  Paid  USA  Ken Burbary  * * Echometrix  ThePulse  All  http://www.echometrix.com  Paid  USA  Adam Smilowitz  * * Effyis  Boardreader  Forums  http://boardreader.com  Free  USA  Ken Burbary  * * Emerge Technology Group  Socialscape  All  http://www.socialscape.biz  Paid  USA  Ken Burbary  * * EvoApp  EvoApp  All  http://www.evoapp.com  Paid  USA  Ken Burbary  * * Facebook  Search  Facebook  http://www.facebook.com/search  Free  USA  Ken Burbary  * * Facebook  Lexicon  Facebook  http://www.facebook.com/lexicon  Free  USA  Ken Burbary  * * Glam Media  Tinker  Twitter  http://www.tinker.com  Free  USA  Ken Burbary  * * Google  Blogsearch  Blogs  http://blogsearch.google.com  Free  USA  Ken Burbary  * * GroupHigh  GroupHigh  Blogs  http://www.grouphigh.com  Paid  USA  Ken Burbary  * * Hubspot  Twitter Grader  Twitter  Twitter Grader  Free  USA  Len Kendall  * * Infegy  Social Radar  All  Social Radar  Paid  USA  Len Kendall  * * Inifinimedia  StartPR  All  http://startpr.com  Paid  USA  Ken Burbary  * * Insttant  Insttant  Twitter  http://insttant.com  Paid  USA  http://www.kenburbary.com  * * Iterasi  Positive Press  All  http://www.iterasi.net  Paid  USA  Ken Burbary  * * JD Power  Umbria  All  http://www.jdpowerwebintelligence.com  Paid  USA  Ken Burbary  * * Jive Software  Jive Social Media Engagement  All  http://www.jivesoftware.com  Paid  USA  Ken Burbary  * * Kaleidico  Eavesdropper  All  http://kaleidico.com  Paid  USA  Ken Burbary  * * Kantar Video  Videolytics  Video  http://www.kantarvideo.com  Paid  USA  Ken Burbary  * * Klout  Klout  Twitter  http://klout.com  Free  USA  Benjamin Schwarz  * * Linkfluence  Linkfluence  All  http://linkfluence.net  Paid  USA  Ken Burbary  * * ListenLogic  Resonate  All  http://www.listenlogic.com  Paid  USA  Ken Burbary  * * Lithium Technologies  Lithium Social Media Monitoring  All  http://www.lithium.com  Paid  USA  Ken Burbary  * * Looxii  Looxii  Social Media  http://www.looxii.com/  Paid  USA  Alex Griffiths  * * Loudpixel  Loudpixel  http://loudpixel.com/  Paid  USA  Alex Griffiths  * * Martiz Research  Evolve24  The Mirror  http://www.evolve24.com  Paid  USA  Ken Burbary  * * Medimix  Scanbuzz  All (niche - pharma)  http://www.medimix.net/  Paid  USA  Ed Hartigan  * * Meltwater  Buzz  All  http://www.meltwater.com  Paid  USA  Ken Burbary  * * Meltwater Group  BuzzGain  All  BuzzGain  Paid  USA  Christine Fife  * * Meltwater Group  Icerocket  Blogs  http://www.icerocket.com  Free  USA  Ken Burbary  * * Meltwater Group  JitterJam  All  http://www.jitterjam.com/  Paid  USA  E. Christopher Clark  * * Milestone Internet Marketing  eBuzz Connect  All  http://www.ebuzzconnect.com/  Paid  USA  Mike Supple  * * Monitter  Monitter  Twitter  http://www.monitter.com  Free  USA  Ken Burbary  * * Moreover Technologies  Newsdesk  All  http://w.moreover.com  Paid  USA  Ken Burbary  * * MotiveQuest  MotiveQuest  All  http://www.motivequest.com  Paid  USA  Ken Burbary  * * mReplay  Livedash  All  http://www.livedash.com  Free  USA  Ken Burbary  * * NetBase  ConsumerBase  All  http://www.netbase.com  Paid  USA  Ken Burbary  * * Networked Insights  SocialSense  All  http://www.networkedinsights.com  Paid  USA  Ken Burbary  * * New Media Strategies  AIM  All  http://newmediastrategies.net  Paid  USA  Ken Burbary  * * Nielsen  Blogpulse  Blogs  http://www.blogpulse.com  Free  USA  Ken Burbary  * * Nielsen  My BuzzMetrics  All  http://en-us.nielsen.com/tab/product_families/nielsen_buzzmetrics  Paid  USA  Ken Burbary  * * Now Metrix  Trendrr  All  http://www.trendrr.com  Free  USA  Ken Burbary  * * NutShellMail  NutShellMail  Social Networks  http://nutshellmail.com  Free  USA  Ken Burbary  * * OneRiot  OneRiot  Twitter, Digg, YouTube  http://www.oneriot.com  Free  USA  Ed Hartigan  * * Overdrive Interactive  Social Media Dashboard  All  http://www.ovrdrv.com  Paid  USA  Jeff Selig  * * Overtone  Open Mic  All  http://www.overtone.com  Paid  USA  Ed Hartigan  * * PeopleBrowsr  Analytic.ly  All  http://analytics.peoplebrowsr.com  Paid  USA  Ken Burbary  * * Pidgin Technologies  Boardtracker  Forums  http://www.boardtracker.com  Free  USA  Ken Burbary  * * Position2  Brand Monitor  All  Position2 Brand Monitor  Paid  USA  Position2  * * PR Newswire  eWatch  Blogs  http://ewatch.prnewswire.com  Paid  USA  Ken Burbary  * * Raven  Raven  All  Raven SEO Tools  Paid  USA  Roy Morejon  * * Reputation Defender  Reputation Defender  All  http://www.reputationdefender.com  Paid  USA  Ken Burbary  * * ReputationHQ  My Reputation Manager  All  http://reputationhq.com  Paid  USA  Ken Burbary  * * Reputationobserver  Reputationobserver  All  http://www.reputationobserver.com  Paid  USA  Sebastian  * * ReviewIQ  ReviewIQ  All  http://www.reviewiq.net  Paid  USA  Ken Burbary  * * Revinate  Revinate  All  http://www.revinate.com  Paid  USA  Ken Burbary  * * RightNow  RightNow CX  All  http://www.rightnow.com/  Paid  USA  Alex Griffiths  * * Samepoint  Samepoint  All  http://www.samepoint.com  Free  USA  Ken Burbary  * * Sensidea  SocialSeek  Blogs, Video, Micromedia, Photos  SocialSeek  Free  USA  Len Kendall  * * SiteQuest Technologies  Compliance WatchDog  All  http://www.sitequesttech.com  Paid  USA  Ken Burbary  * * Social Mention  Social Mention  All  http://socialmention.com  Free  USA  Ken Burbary  * * SocialOomph  SocialOomph  Twitter  SocialOomph  Free  USA  Jason Mayes  * * Spiral16  Spark  All  http://www.spiral16.com  Paid  USA  Ken Burbary  * * Sports Media Challenge  Buzz Manager   All  http://www.sportsmediachallenge.com/buzzmanager/index.html  Paid  USA  Ryan Stephens  * * Sprinklr  Sprinklr  Twitter and Facebook  http://www.sprinklr.com/  Paid  USA  Christine Fife  * * Sprout Social  Sprout Social  All  http://sproutsocial.com/  Paid  USA  Alex Griffiths  * * SWIX  SWIX  All  http://swixhq.com/SWIX.html  Paid  USA  Sasha Kovaliov  * * Tealium  Tealium SM  All  http://www.tealium.com/products/social-media/index.html  Paid  USA  Tony Felice  * * Technorati  Blogsearch  Blogs  http://technorati.com  Free  USA  Ken Burbary  * * Techrigy  SM2  All  http://www.alterian-social-media.com  Paid  USA  Ken Burbary  * * Telligent  Telligent Analytics  All  http://telligent.com/products/telligent_analytics/  Paid  USA  Peter Brenchley  * * The Search Monitor  The Search Monitor (Starter and Pro)  All  http://www.thesearchmonitor.com/  Free  USA  Christine Fife  * * TipTop Technologies  TipTop  Twitter, Amazon reviews  http://feeltiptop.com  Free  USA  Ken Burbary  * * Todaypulse  Todaypulse  All  http://todaypulse.com  Paid  USA  Justin Walsh  * * Topsy Labs  Topsy  Twitter  http://topsy.com/  Free  USA  Christine Fife  * * Trackur LLC.  Trackur  All  Trackur  Paid  USA  Roy Morejon  * * Twazzup  Twazzup  Twitter  http://www.twazzup.com  Free  USA  Ken Burbary  * * TweetBeep  TweetBeep  Twitter  http://www.tweetbeep.com  Free  USA  Michael Jensen  * * Tweetlytics  Tweetlytics  Twitter  http://www.tweetlytics.com/  Paid  USA  Alex Griffiths  * * TweetReach  TweetReach  Twitter  TweetReach  Free  USA  Jason Mayes  * * Twitter  Twitter Search  Twitter  http://search .twitter.com  Free  USA  Ken Burbary  * * TwitterCounter  TwitterCounter  Twitter  TwitterCounter  Free  USA  Jason Mayes  * * Viralheat  Viralheat  All  http://www.viralheat.com  Paid  U.S.A  Greg  * * Visible Measures  TruReach, Video Engagement  Video  http://www.visiblemeasures.com  Paid  USA  Pierre-Loïc Assayag  * * Visible Technologies  Visible Intelligence  All  http://www.visibletechnologies.com  Paid  USA  Ken Burbary  * * Vocus, Inc.  Vocus PR  All  http://www.vocus.com/content/social-media.asp  Paid  USA  Ken Burbary  * * Web Analytics Demystified  Twitalyzer  Twitter  http://www.twitalyzer.com  Free  USA  Ken Burbary  * * Who's Talkin  Who's Talkin  ALL  Who's Talkin  Paid  USA  Roy Morejon  * * Wildfire  Monitor  Twitter, Facebook  http://monitor.wildfireapp.com  Free  USA  Ken Burbary  * * Wool.Labs  WebDig, DigTV, AdSlider  All Internet + TV/Radio  http://woollabs.com  Paid  USA  Steve Chiles  * * Xerocity Design Group  twitt(url)y  Twitter  http://twitturly.com/  Free  USA  Claudius Gerstner  * * YackTrack  YackTrack  Blogs  http://yacktrack.com  Free  USA  Rob Diana  * * MutualMind  MutualMind  All  http://mutualmind.com  Paid  US  Babar Bhatti  * * Geofeedia  Geofeedia  Twitter, Instagram, Fickr, Picasa, YouTube  http://www.geofeedia.com  Paid  United States  Ken Burbary  * * Social Agency Inc  SpredFast  All  http://spredfast.com  Paid  United States  Ken Burbary  * * Social Report  Social Report  All  https://www.socialreport.com  Paid  United States  Ken Burbary  * * DigitalMR   Social Nuggets  All  http://www.digital-mr.com  Paid  UK, USA, Cyprus  Michalis A. Michael  * * Integrasco AS  WoMPortal   All  Integrasco  Paid  UK, Norway, China  Integrasco  * * 1000Heads  WOMTrak  All  http://www.1000heads.com  Paid  UK  Ken Burbary  * * Brandwatch  Brandwatch  All  http://www.brandwatch.net  Paid  UK  Fabrice Retkowsky  * * Inuda Innovations  HowSociable  All  http://howsociable.com/  Free  UK  Christine Fife  * * Macranet  Sentiment Metrics  All  http://www.sentimentmetrics.com  Paid  UK  Ed Hartigan  * * Market Sentinel  LiveBuzz  All  http://www.marketsentinel.com/  Paid  UK  Christine Fife  * * MediaBadger  Mediasphere360  All  http://www.mediabadger.com  Paid  UK  Ken Burbary  * * Noteca  Noteca  All  http://www.noteca.com  Paid  UK  Ken Burbary  * * Onalytica  Direct Access - InfluenceMonitor  All  http://www.onalytica.com  Paid  UK  Ken Burbary  * * Rees Bradley Hepburn Ltd  RBH Radar  All  http://www.rbh.co.uk  Paid  UK  Ken Burbary  * * Simpleweb Ltd.  Media Genius  All  http://www.mediageniusapp.com  Paid  UK  Ken Burbary  * * Sodash  Sodash  Twitter, Facebook, email, specific blogs via RSS  soda.sh/  Paid  UK  Alex Griffiths  * * Tick Tock Boom Digital  BoomSonar  All  http://www.boomsonar.com  Paid  Turkey  Ken Burbary  * * FinchLine  FinchLine  All  http://www.finchline.nl  Paid  The Netherlands  Ken Burbary  * * New Music Labs BV  Tribe Monitor  Online (MySpace, Hyves, Last.fm, Twitter, Google Analytics, FaceBook, Google Video, Youtube)  Tribe Monitor  Free  The Netherlands  New Music Labs  * * MeMo News AG  MeMo News Monitoring  All: News, Blogs, Forums, Social Media (Facebook, Twitter, Google+, Youtube ...)  MeMoNews.com  Paid  Switzerland  Stefan Vetter  * * Netbreeze  CommMonitor  All  http://www.netbreeze.ch  Paid  Switzerland  Ken Burbary  * * Intelliwell  Informant  All  http://informant.se  Paid  Sweden  Ken Burbary  * * Patch6 AB  Silverbakk Briefing Room  All  http://www.silverbakk.com  Paid  Sweden  Ken Burbary  * * Retriever   Retriever  Blogs, Twitter, Facebook  http://www.retriever.se  Paid  Sweden  Ken Burbary  * * Cierzo Development S.L  Smmart  All  http://www.smmart.es  Paid  Spain  Ken Burbary  * * Habber tec  Social Web Intelligence  All  http://socialwebintelligence.com  Paid  Spain  Ken Burbary  * * Tinval Sistemes S.L.  BrandChats  All  http://www.brandchats.com  Paid  Spain  * * WhatHashtag by Círculo Rojo  WhatHashtag  Twitter  http://whathashtag.circulorojo.es/  Free  Spain  Álex Rubio @alexrbn (Círculo Rojo)  * * Daumsoft  UCCmetrics  All  http://www.daumsoft.com  Paid  South Korea  Ken Burbary  * * Brands Eye  Brands Eye  All  http://www.brandseye.com  Paid  South Africa  Ken Burbary  * * ThoughtBuzz  ThoughtBuzz  All  http://www.thoughtbuzz.net  Paid  Singapore, Malaysia, Philippines, Indonesia   * * JamIQ  JamIQ  All  http://www.jamiq.com  Paid  Singapore  * * YouScan  YouScan  All  http://www.youscan.ru  Paid  Russia, Ukraine  Alexey Orap  * * TreeWorks  Zelist Monitor  Blogs, Twitter, online media, Facebook, some of the most important discussion boards/forums in Romania  http://www.zelistmonitor.ro  Paid  Romania  Catalin Tenita  * * BrandReact Nederland BV  Social Media Monitoring, Reporting & Response  All: Blogs, News Sites, Consumer Sites (Radar, Kieskeurig etc), Review Sites (Yelp, Travelocity), Social Media (Facebook, Twitter, LinkedIn, YouTube, Orkut, Hyves, etc)  BrandReact.NL  Paid  Netherlands, Belgium, Luxemburg  Dick Raman  * * Clipit News  Clipit - online media monitoring  All (dutch)  http://www.clipit.nl  Paid  Netherlands  Sjaak Janssen  * * iMonitoring  iMonitoring  All  http://www.internetmonitoring.nl  Paid  Netherlands  Ken Burbary  * * Teezir   eCare  All  http://www.teezir.com  Paid  Netherlands  Ken Burbary  * * TraceBuzz  TraceBuzz  All  http://www.tracebuzz.com  Paid  Netherlands  Ken Burbary  * * Twitter Analyzer  Twitter Analyzer  Twitter  http://twitteranalyzer.com  Free  Netherlands  Claudius Gerstner  * * Trendiction  Trendiction Search  All  http://www.trendiction.com  Paid  Luxembourg  Ken Burbary  * * Expert System  Cognito Monitor  All  http://www.expertsystem.net  Paid  Italy, USA  Ken Burbary  * * BuzzDetector  BuzzDetector  All  http://www.buzzdetector.com  Paid  Italy  Ken Burbary  * * infoFactory  ifMONITOR  All  http://www.infofactory.it  Paid  Italy  Ken Burbary  * * SocialPointer  Social Pointer  All  http://www.socialpointer.com  Free  Israel  Yair Benyami  * * Katapedia  Katapedia  All  http://www.katapedia.com  Paid  Indonesia  Deddy Rahman  * * Beevolve  Social Media Monitoring & Engagement Platform  All  http://www.beevolve.com/  Paid  India  Christine Fife  * * Factualz  Factualz  All  http://www.factualz.com  Paid  India  Ken Burbary  * * Omllion  Omllion  All  http://www.omllion.com  Paid  India  Ken Burbary  * * Webfluenz   Webfluenz   All  http://webfluenz.com  Paid  India  Ken Burbary  * * Brandmonitor  Brandmonitor  All  http://www.brandmonitor.hu  Paid  Hungary  * * Glerts  Glerts  All media indexed by Google  http://www.glerts.com/beta  Free  Global  http://www.glert.com  * * Cognita AG  blueReport  Blogs, Twitter  http://www.bluereport.net  Paid  Germany, Switzerland, Austria   Ken Burbary  * * Mindlab Solutions GmbH  netmind Sphere  All  http://www.mindlab.de  Paid  Germany, Austria, Switzerland  Heinz D. Schultz  * * Ethority  Gridmaster  All  http://www.ethority.net  Paid  Germany  Ken Burbary  * * Frank Westphal  Rivva  Blogs, Twitter  http://rivva.de/  Free  Germany  Claudius Gerstner  * * iMooty  iMooty  News  http://www.imooty.eu  Free  Germany  Ken Burbary  * * infospeed  web2monitor™  All  infospeed  Paid  Germany  Social Media Magazin  * * Landau Media  Landau Media Monitoring Internet  All  http://www.landaumedia.de  Paid  Germany  Ken Burbary  * * net-clipping  net-clipping  Online, Social Media, amazon, facebook  http://net-clipping.de  Paid  Germany  Cornelia Horst  * * New Communication  Reputation Control  All  http://www.reputation-control.de  Paid  Germany  * * TwentyFeet  TwentyFeet  Twitter, Facebook, YouTube, Google Analytics, bit.ly, MySpace  http://www.twentyfeet.com  Paid  Germany  Paul Herwarth  * * User Interface Design GmbH  What's Up?!  Twitter  http://whatsup.uid.com  Free  Germany  Ken Burbary  * * Webbosaurus  Webboboard  All  webbosaurus.de  Paid  Germany  Webbosaurus  * * AT Internet  BuzzWatcher  All  http://en.atinternet.com  Paid  France  Ken Burbary  * * AT Internet  BuzzWatcher  All  http://en.atinternet.com/Products/BuzzWatcher.aspx  Paid  France  Ken Burbary  * * Semiocast  Semioboard  All  Semioboard.com  Paid  France  Jean-Charles Campagne  * * Statsit   Monitor  All  http://www.statsit.com  Paid  Finland, Malaysia  Ken Burbary  * * M-Brain  M-Brain  All  http://www.m-brain.com/  Paid  Finland  Joakim Nyberg  * * Whitevector  Whitevector  All  http://www.whitevector.com  Paid  Finland  Ken Burbary  * * Blogmeter  Blogmeter  All  http://www.blogmeter.eu  Paid  Europe  Barbara Aversano  * * Replise  Replise  All  Replise.com  Paid  Europe  * * Socialware  Asomo  All  http://www.asomo.net  Paid  Europe  Ken Burbary  * * Synthesio  Synthesio  All  Synthesio  Paid  Europe  Len Kendall  * * BrandMetric  BrandMetric  All  http://www.brandmetric.com  Paid  Chile  Ken Burbary  * * DNA13  dnaMonitor  All  http://www.dna13.com/  Paid  Canada  Christine Fife  * * Lola  Variety of off-the-shelf tools and proprietary technologies  All online sources  Lola  Paid  Canada  Luis Vieira  * * MediaMiser  MediaMiser Enterprise  All  http://www.mediamiser.com  Paid  Canada  Ken Burbary  * * MyFrontSteps  Steprep  All  http://steprep.myfrontsteps.com  Free  Canada  Ken Burbary  * * PostRank Inc  PostRank  RSS Enabled Content, Blogs, Social Networks & Hubs  PostRank  Free  Canada  PostRank  * * RepuMetrix  RepuTrace, RepuTrack  All  http://www.repumetrix.com  Paid  Canada  Ken Burbary  * * Salesforce  Radian6  All  http://www.radian6.com  Paid  Canada  Ken Burbary  * * Syncapse Corp  Socialtalk  Twitter, Facebook, Wordpress, Moveable Type  http://www.socialtalk.com  Paid  Canada  Alex Griffiths  * * Sysomos  MAP, Heartbeat  All  http://www.sysomos.com  Paid  Canada  Ken Burbary  * * White Noise Inc.  White Noise  All  http://www.herdthenoise.com  Paid  Canada  Ken Burbary  * * Chleba Agencia digital  Social media Monitor  Google Blogs / Flickr / Twitter / Google News / Yahoo Respostas / Facebook / Orkut Comunidades / Reclame Aqui / YouTube   http://www.socialmediamonitor.com.br/  Paid  Brazil  Henrique Rangel  * * Scup  Scup  All  http://www.scup.com.br  Paid  Brazil  Ken Burbary  * * Attentio  Buzz Report  All  http://www.attentio.com  Paid  Belgium  Simon McDermott  * * BrandFractal   CommandCenter, Sodalyzer, social data analytics  All  http://www.brandfractal.com  Paid  Belgium  Ken Burbary  * * Engagor  Engagor Insights  All  http://www.engagor.com  Paid  Belgium  Ken Burbary  * * BuzzNumbers  BuzzNumbers  All  http://www.buzznumbershq.com  Paid  Australia  Ken Burbary  * * e-CBD  Dialogix  All  http://www.dpdialogue.com.au  Paid  Australia  Ken Burbary  * * StreamWall  StreamWall  All  http://www.socialmediamonitoring.com.au  Paid  Australia  Ken Burbary  * * Walkley  Walkley  All  http://www.walkley.com.au/  Paid  Australia  Walkley  * * Flaptor  Trendistic (formerly Twist)  Twitter  http://trendistic.com  Free  Argentina  Claudius Gerstner  * * SocialMetrix  SocialMetrix  All  http://www.SocialMetrix.com  Paid  Argentina  Sebastian Rosenfeld  * * Buzzcapture B.V.  Buzzcapture  All  http://www.buzzcapture.com  Paid  Amsterdam  Ken Burbary  * * Eurospider Information Technology AG  Media Monitoring & Management  All  Media Monitoring &amp; Management  Paid  All  Loig Roumois  * * uberVU  uberVU  blogs, Twitter, Digg, FriendFeed and many more  http://www.ubervu.com/  Free  Bryan Skelton  * * WhoUnfollowedMe  WhoUnfollowedMe  Twitter  WhoUnfollowedMe  Free  Jason Mayes  [[Category:OSINT]] 778a7e4333164dc91b407e8782ec12929aa8042f File:Open Source Intelligence Professional Handbook.pdf 6 301 720 2016-06-30T01:45:48Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 721 720 2016-06-30T01:51:00Z Eddie 1 wikitext text/x-wiki [[Category:Resources]] 8e670026d35cdefe0315772d2adb5392b9928605 722 721 2016-06-30T01:52:08Z Eddie 1 wikitext text/x-wiki [[Category:OSINT Resources]] 5d3310acf15f2ef6cf0b5c8b88bcaa376510a0e8 723 722 2016-06-30T01:52:26Z Eddie 1 wikitext text/x-wiki [[Category:OSINT]] 1deef907935ff6f6149fc1160398190635d9d7f0 727 723 2016-06-30T02:02:05Z Eddie 1 wikitext text/x-wiki [[Category:Resources]] [[Category:OSINT]] 1c74451b963a34b81cdb653fa360a111e68afe5d File:Benavides Online OSINT Quick Reference Handbook 2009.epub 6 302 724 2016-06-30T01:54:09Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 725 724 2016-06-30T01:54:33Z Eddie 1 wikitext text/x-wiki [[Category:OSINT]] 1deef907935ff6f6149fc1160398190635d9d7f0 File:Reachback-Operations-for-Air-Campaign-Planning-and-Execution.pdf 6 303 728 2016-06-30T02:26:28Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 729 728 2016-06-30T02:27:46Z Eddie 1 Eddie moved page [[File:Csat1.pdf]] to [[File:Reachback-Operations-for-Air-Campaign-Planning-and-Execution.pdf]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 730 729 2016-06-30T02:28:20Z Eddie 1 wikitext text/x-wiki [[Category:Reference]] 2c7e43280fb308c1445a5efa4ab771563762b9c7 Knowledge Center 0 200 731 617 2016-06-30T02:33:50Z Eddie 1 wikitext text/x-wiki __NOEDITSECTION__ <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 320ac3becf86ce4e12f0a428bac8c2747059b604 732 731 2016-06-30T02:34:13Z Eddie 1 Undo revision 731 by [[Special:Contributions/Eddie|Eddie]] ([[User talk:Eddie|talk]]) wikitext text/x-wiki __NOEDITSECTION__ [[File:World-Banner.png|left|framed|link= ]] {| style="width:100%; background:#fcfcfc; margin-top:1.2em; border:1px solid #ccc;" | style="width:56%; color:#000;" | <!-- "WELCOME TO OWIKI AND ARTICLE COUNT --> {| style="width:280px; border:none; background:none;" | style="width:280px; text-align:center; white-space:nowrap; color:#000;" | <div style="font-size:162%; border:none; margin:0; padding:.1em; color:#000;">REACHBACK OPERATIONS </div> |} |} {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 21e5f0a2737b63ed9e5292408193246bac0742b9 733 732 2016-06-30T02:49:51Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ =Overview= This site provides a working prototype for a reachback support cell. '''Situation Center''' This provides an automated analysis of certain data that is being collected during the assessment. This utilizes a two part process, first data is collected, it is then formatted and analyzed by back end systems. '''Progress Status''' Updates on current, completed, and upcoming activities. '''Risk factors''' Additional elements that have been uncovered and are being considered during the assessment. =Alert Level= =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 235002d20f16e54b4e26afd9c79c079b16d14e41 734 733 2016-06-30T03:00:56Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ =Overview= This site provides working prototype for a reachback support cell. '''Situation Center''' This provides an automated analysis of certain data that is being collected during the assessment. This utilizes a two part process, first data is collected, it is then formatted and analyzed by back end systems. '''Progress Status''' Updates on current, completed, and upcoming activities. '''Risk factors''' Additional elements that have been uncovered and are being considered during the assessment. =Alert Level= =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 97928e6eee673d29823530c356a195b6d1ea0c83 740 734 2016-06-30T04:22:31Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ =Overview= [[File:Reachback-def-jp-3-30.png|framed|left]] '''Situation Center''' This provides an automated analysis of certain data that is being collected during the assessment. This utilizes a two part process, first data is collected, it is then formatted and analyzed by back end systems. '''Progress Status''' Updates on current, completed, and upcoming activities. '''Risk factors''' Additional elements that have been uncovered and are being considered during the assessment. =Alert Level= =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 2079a15e2dfb99e43751ae3563bae850e160fda9 741 740 2016-06-30T04:23:10Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Reachback-def-jp-3-30.png|framed|left]] '''Situation Center''' This provides an automated analysis of certain data that is being collected during the assessment. This utilizes a two part process, first data is collected, it is then formatted and analyzed by back end systems. '''Progress Status''' Updates on current, completed, and upcoming activities. '''Risk factors''' Additional elements that have been uncovered and are being considered during the assessment. =Alert Level= =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 91626c354a051dfdb7b5f64aa3b48abcd9c3b330 742 741 2016-06-30T04:23:49Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Reachback-def-jp-3-30.png|framed|left]] <br /> =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} a3cf43de79820cabb5de3f1291f025856eb5ab8d 743 742 2016-06-30T04:24:26Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ <div> [[File:Reachback-def-jp-3-30.png|framed|left]] </div> =Situation Center= {| |style="vertical-align:top"|{{#viki:pageTitles=Current Activities, Surface Exposure|width=500|height=500}} |} =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 0ba8a67a7aaf8e1225a512e66770c781017bcfa1 744 743 2016-06-30T04:25:41Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ =Overview= [[File:Reachback-def-jp-3-30.png|framed|left]] =Progress Status= {|- | style="color:#000;padding:2px 3px 3px" | <div> <br /> '''[[MediaWiki:Overarching|Overarching]]''' Guiding Instruments * Center of Gravity * '''[[Crown Jewels Analysis]]''' * Targeting Assessment Countering Analysis (TCAC) * '''[[Cyber Early Warning|Cyber Threats]]''' and '''[[ABI-INTRO|methodology]]''' </div> |} ''' Complete ''' <br /> * Deployment into the reachback.io as the primary family MOBOPS namespace included as family member MOBOPS namespace interlink translation to CIMACELL extended family * Custom monitoring for information leaks (paste sites, TOR to clear dump links etc.) * Passive sensor placements (DNS) * Harvesting agent placements (Surface Exposure and Targeting) * Established links to allow emerging associations and pattern analysis ''' Ongoing ''' * Defining Centers of Gravity * Global Awareness - provide awareness of the current landscape. * Threat Analysis - a semantic based analytically living product.. * Surface Exposure - visually representation showing the surface exposure to pinpoint areas of interest and support in minimizing. * Identifying domains, websites, and dns and other online assets with a direct relationship] * Identifying third parties, trusted business partners, vendors, and others indirect relationships * Learning the people, personalities, and positions within the organization to assess their ability to help obtain access. * Learning the technology and internal structure and staff responsible for the various areas the technology is used. * Multi discipline intelligence activities * Link analysis, historical timeline, and social network analysis using online social network media =Risk Factors= <br /> The methodology used in risk and vulnerability analysis was developed to compliment the best practices found in fortune 50 organizations, and organizations like MITRE. Our hybrid solution is unique both in the innovative use of technology and in our counter target centric approach. <br /> {{New Paragraph}} <big>''' Third Parties '''</big> <br /> Other organizations who deal with Motability data and therefore may pose a third party risk. * httx://www.rsagroup.com/rsagroup/en/home Royal Sun Alliance Insurance * httx://www.rac.co.uk/new The RAC * httxs://www.kwik-fit.com/home.asp Kwik Fit {{New Paragraph}} <big>''' Computer Networks '''</big> <br /> [[IPV4_info|MOBOPS Identified IP addresses]] <br /> [[Certificates|Digital Certificates]] {{New Paragraph}} <big>'''Open Source'''</big> *Associated domains - 30+ direct 10+ indirect - note this is not an effort to identify MOBOPS “owned assets” but rather MOBOPS “assets to protect” and the accepting risks resulting from outside or uncontrollable through normal risk management processes. *Associated email accounts - 30+ high value accounts that could be used as part of an attack plan. *Associated technologies - Video appears to be of interest but for purposes not directly obvious for use in attack. Our team will continue to identify the interest and initially make attempts to determine any covert communications directly related to an attack and providing command and control (C2) functions and the possible manipulation by third parties for their benefit. *Social Media - we have started to look into the social media practices of MOBOPS for comparison with research datasets. Our services are focused in sentiment analysis, influence, rumor analysis, and deception detection and deceptive countermeasures for protection. If there are requirements or desires for social media monitoring or trend analysis we have an extensive list of providers and services ranging from free to geared for government pricing that can be accessed for assisting in such areas. <headertabs /> {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} c78900ec09fbb17901ff2f046bc733c3d0022857 752 744 2016-09-09T09:15:51Z Eddie 1 Replaced content with "__NOTOC__ __NOEDITSECTION__ =Overview= [[File:Reachback-def-jp-3-30.png|framed|left]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title I..." wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ =Overview= [[File:Reachback-def-jp-3-30.png|framed|left]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 1db63a094ecb4a2d078f5a4ba53b97d2580cad48 File:Gears.png 6 304 735 2016-06-30T03:08:24Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Protect 0 305 736 2016-06-30T03:48:29Z Eddie 1 Created page with "{{Glossary Term |Glossary Definition=To cover or shield from exposure, damage, or destruction. To keep from harm, attack, injury or exploitation. To maintain the status or int..." wikitext text/x-wiki {{Glossary Term |Glossary Definition=To cover or shield from exposure, damage, or destruction. To keep from harm, attack, injury or exploitation. To maintain the status or integrity of. To take action to guard against espionage or capture of sensitive equipment and information. }} 5522a6241060d223a75e207ee308f7be8d18db84 PROTECT 0 306 737 2016-06-30T03:49:29Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=Protect |Glossary Definition=To cover or shield from exposure, damage, or destruction. To keep from harm, attack, injury or exploitation. To mai..." wikitext text/x-wiki {{Glossary Term |Glossary Term=Protect |Glossary Definition=To cover or shield from exposure, damage, or destruction. To keep from harm, attack, injury or exploitation. To maintain the status or integrity of. To take action to guard against espionage or capture of sensitive equipment and information. }} 3683d9444078e0992b727c28e9f500b068a2d096 738 737 2016-06-30T03:50:00Z Eddie 1 wikitext text/x-wiki {{Glossary Term |Glossary Term=Protect |Glossary Definition=To cover or shield from exposure, damage, or destruction. To keep from harm, attack, injury or exploitation. To maintain the status or integrity of. To take action to guard against espionage or capture of sensitive equipment and information. }} b649261ec28ac652f320543c28834a7b4b843ba2 File:Reachback-def-jp-3-30.png 6 307 739 2016-06-30T04:21:25Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 Property:Hierarchy Data 102 47 745 71 2016-07-13T20:36:12Z Eddie 1 wikitext text/x-wiki This is a property of type [[Has type::Code]]. [[Category:Framework Pages]] 07091ad5ce8600dd3cd56a1c65d7369ae3aaa5ea Property:Hide Title Icon 102 308 746 2016-07-13T20:40:31Z Eddie 1 Created a property of type [[Has type::Text]] wikitext text/x-wiki This is a property of type [[Has type::Text]]. 7a219f48fc26b2aae6b81b105b75d5cda6cb6a92 File:Characterizing-effects-cyber-adversary.pdf 6 309 747 2016-07-21T00:07:20Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 748 747 2016-07-21T00:07:48Z Eddie 1 Eddie moved page [[File:Characterizing-effects-cyber-adversary-13-4173.pdf]] to [[File:Characterizing-effects-cyber-adversary.pdf]] without leaving a redirect wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 749 748 2016-07-21T00:08:22Z Eddie 1 wikitext text/x-wiki [[Category:Resources]] 8e670026d35cdefe0315772d2adb5392b9928605 Property:Foaf:mbox 102 310 750 2016-07-26T00:23:25Z Eddie 1 Created a property of type [[Has type::Page]] wikitext text/x-wiki This is a property of type [[Has type::Page]]. a77920a9d24db1d24320cdd74718a3bf351bd0c9 751 750 2016-07-26T00:23:57Z Eddie 1 wikitext text/x-wiki This property represents the imported [[FOAF]] property. It is used to specify someones [[has type::email]] address in URI-form. However: '''Do not use ''foaf:mbox'' directly.''' Instead, use the template [[Template:mailbox]] as follows: <nowiki>{{mailbox|someone@somewhere.org}}</nowiki> to get multiple annotations in one step: one with ''foaf:mbox'' and one with [[Property:email]]. To still use ''foaf:mbox'', one would write <nowiki>[[foaf:mbox::mailto:someone@somewhere.org]]</nowiki> where "mailto:" is important. '''Attention:''' FOAF specifies that everything with a value for ''foaf:mbox'' is a ''foaf:Agent'', i.e. some entity that can do something. So do not use ''foaf:mbox'' to assign an email, e.g., to a conference. An alternative to ''foaf:mbox'' is [[Property:email]] which encodes emails as a string (without "mailto:" and without a FOAF interpretation). 4e7e2e9582bab0f53b6f586d78c0ff86b02421d1 Knowledge Center 0 200 753 752 2016-09-09T09:16:21Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:Reachback-def-jp-3-30.png|framed|left]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} aba6831669f86ba40416721eda9a73f04f9bf816 756 753 2016-10-06T19:37:31Z Eddie 1 wikitext text/x-wiki __NOTOC__ __NOEDITSECTION__ [[File:World Banner.png|framed|left]] {{#set:Name={{PAGENAME}}}} {{DISPLAYTITLE: Reachback Operations}} {{#set:Title Icon=Gears.png}} 360a2a5c01cc422a5a5c9c2f94a733f298e19846 File:COG.png 6 311 754 2016-10-06T19:36:36Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:World Banner.png 6 312 755 2016-10-06T19:36:59Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Gears.png 6 304 757 735 2016-10-06T19:38:07Z Eddie 1 Eddie uploaded a new version of [[File:Gears.png]] wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 CIP FRAMEWORK 0 313 758 2016-11-25T16:55:40Z Eddie 1 Created page with "The '''Corporate Intelligence Priorities Framework'' is a SENSITIVE document used by the top planners and decision makers within the organization. This summarizes the organiz..." wikitext text/x-wiki The '''Corporate Intelligence Priorities Framework'' is a SENSITIVE document used by the top planners and decision makers within the organization. This summarizes the organizations information gathering priorities. This document typically does not change although certain events such as merging with another organization or changes in law or locations operating can be reason for modify or rewrite. '''The Warning Conundrum''' Today’s dispersed, fast-changing threat environment, in which the capabilities of adversaries are increasingly enhanced by technological advances, challenges organizations as never before. '''Warning''' is designed not only to avert intelligence failures; it also strives to prepare consumers to respond to unanticipated developments—indeed, to expect such developments in the years ahead. Incorporating '''strategic warning''' in the process to establish and define substantive priorities will assist in effectively managing resources to cover crises and standing requirements. 1. An agile, accessible, and automated framework. Although all members agree that the Organization needs some type of prioritization scheme, they stress that it must not only be customer-derived, but also dynamic, accessible, and appropriate for the current digital collection, production, and resource management environment. 2. A rational, coherent structure to support analysis, collection, and systems acquisition. Recognizing that the corporate-level priorities framework must support the current and future needs of the analytic and collection activities, the guidance must be both broad and specific—ensuring the necessary granularity to drive the development of collection requirements management systems, as well as future systems acquisition. 3. Integrating national priorities documents and strategic analysis. To prepare for future intelligence challenges, the national-level priorities framework should integrate strategic estimates and analytic products into its calculations. Combined with adding accountability to the “warning” and “risk management” procedures, these changes will minimize the chances of strategic surprise and intelligence failure. 4. Improving strategic warning. Among other advances, we should apply greater analytic rigor and methodologically grounded approaches to our assessments. 36ae24df0de951bf0784b6e6e54d4d98832f410d 765 758 2016-11-25T17:46:53Z Eddie 1 Eddie moved page [[CIPF FRAMEWORK]] to [[CIP FRAMEWORK]] wikitext text/x-wiki The '''Corporate Intelligence Priorities Framework'' is a SENSITIVE document used by the top planners and decision makers within the organization. This summarizes the organizations information gathering priorities. This document typically does not change although certain events such as merging with another organization or changes in law or locations operating can be reason for modify or rewrite. '''The Warning Conundrum''' Today’s dispersed, fast-changing threat environment, in which the capabilities of adversaries are increasingly enhanced by technological advances, challenges organizations as never before. '''Warning''' is designed not only to avert intelligence failures; it also strives to prepare consumers to respond to unanticipated developments—indeed, to expect such developments in the years ahead. Incorporating '''strategic warning''' in the process to establish and define substantive priorities will assist in effectively managing resources to cover crises and standing requirements. 1. An agile, accessible, and automated framework. Although all members agree that the Organization needs some type of prioritization scheme, they stress that it must not only be customer-derived, but also dynamic, accessible, and appropriate for the current digital collection, production, and resource management environment. 2. A rational, coherent structure to support analysis, collection, and systems acquisition. Recognizing that the corporate-level priorities framework must support the current and future needs of the analytic and collection activities, the guidance must be both broad and specific—ensuring the necessary granularity to drive the development of collection requirements management systems, as well as future systems acquisition. 3. Integrating national priorities documents and strategic analysis. To prepare for future intelligence challenges, the national-level priorities framework should integrate strategic estimates and analytic products into its calculations. Combined with adding accountability to the “warning” and “risk management” procedures, these changes will minimize the chances of strategic surprise and intelligence failure. 4. Improving strategic warning. Among other advances, we should apply greater analytic rigor and methodologically grounded approaches to our assessments. 36ae24df0de951bf0784b6e6e54d4d98832f410d Intelligence Priorities 0 314 759 2016-11-25T17:11:17Z Eddie 1 Created page with "'''Goal''' To foster development of coherent strategies to establish substantive priorities that meet the competing demands of policymakers and corporate leadership for curre..." wikitext text/x-wiki '''Goal''' To foster development of coherent strategies to establish substantive priorities that meet the competing demands of policymakers and corporate leadership for current intelligence, long-term analysis, and strategic warning, and to provide collectors with more specific requirements guidance. The [[CIP FRAMEWOK]] provides an overall structure in developing overarching corporate priorities followed by decision makers, strategic analysis and early warning provisions. Intelligence Priorities exist in hierarchies within the CIP Framework and must allow but also dynamic, accessible, and appropriate for the current digital collection, production, and resource management environment. 64bbd017162129b3495108f12f8a8a6982cc0c2b 760 759 2016-11-25T17:11:39Z Eddie 1 wikitext text/x-wiki '''Goal''' To foster development of coherent strategies to establish substantive priorities that meet the competing demands of policymakers and corporate leadership for current intelligence, long-term analysis, and strategic warning, and to provide collectors with more specific requirements guidance. The [[CIP Framework]] provides an overall structure in developing overarching corporate priorities followed by decision makers, strategic analysis and early warning provisions. Intelligence Priorities exist in hierarchies within the CIP Framework and must allow but also dynamic, accessible, and appropriate for the current digital collection, production, and resource management environment. ae6be6d86bc99cb31802121b83c33e0f93649eef 761 760 2016-11-25T17:12:39Z Eddie 1 wikitext text/x-wiki '''Goal''' To foster development of coherent strategies to establish substantive priorities that meet the competing demands of policymakers and corporate leadership for current intelligence, long-term analysis, and strategic warning, and to provide collectors with more specific requirements guidance. The [[CIPF FRAMEWORK]] provides an overall structure in developing overarching corporate priorities followed by decision makers, strategic analysis and early warning provisions. Intelligence Priorities exist in hierarchies within the CIP Framework and must allow but also dynamic, accessible, and appropriate for the current digital collection, production, and resource management environment. aed14cc882bd12d406e68ba5c4a0e8fdb945832c CRITICAL INTELLIGENCE 0 315 762 2016-11-25T17:19:55Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=Critical Intelligence |Glossary Definition=Intelligence that is crucial and requires the immediate attention of the commander. It is required to..." wikitext text/x-wiki {{Glossary Term |Glossary Term=Critical Intelligence |Glossary Definition=Intelligence that is crucial and requires the immediate attention of the commander. It is required to enable the commander to make decisions that will provide a timely and appropriate response to actions by the potential or actual enemy. It includes but is not limited to the following: 1) strong indications of the imminent outbreak of hostilities of any type (warning of attack); 2) aggression of any nature against a friendly country; 3) indications or use of nuclear, biological, and chemical weapons; or 4) significant events within potential enemy countries that may lead to modification of nuclear strike plans. (JP 1-02 & JP 2-0) }} a19f7aee02e9baa914e133db8ca315cd38479215 CRITICAL INFORMATION 0 316 763 2016-11-25T17:21:30Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=Critical Information |Glossary Definition=Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries f..." wikitext text/x-wiki {{Glossary Term |Glossary Term=Critical Information |Glossary Definition=Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment. (JP 1-02 & JP 2-0) }} 2b3baadc11e750f8af841d94f6572dc34d20ed21 COMMANDERS CRITICAL INFORMATION REQUIREMENT 0 317 764 2016-11-25T17:27:46Z Eddie 1 Created page with "{{Glossary Term |Glossary Term=Commanders Critical Information Requirement |Glossary Definition=An information requirement identified by the commander as being critical to fac..." wikitext text/x-wiki {{Glossary Term |Glossary Term=Commanders Critical Information Requirement |Glossary Definition=An information requirement identified by the commander as being critical to facilitating timely decision-making. The two key elements are friendly force information requirements and priority intelligence requirements. (JP 1-02 & JP 3-0) }} cd9bccf00c5bab9d336bdec05cd0a2d43cc34035 CIPF FRAMEWORK 0 318 766 2016-11-25T17:46:53Z Eddie 1 Eddie moved page [[CIPF FRAMEWORK]] to [[CIP FRAMEWORK]] wikitext text/x-wiki #REDIRECT [[CIP FRAMEWORK]] e0ed834bc7176c1c540aa57574030548d5b1ec24 File:Intel-process.png 6 319 767 2016-11-25T18:42:44Z Eddie 1 The Intelligence Process wikitext text/x-wiki The Intelligence Process a6252fc0b95a0e2a1bc93dc5926deb361d7e85a0 Intelligence Process Missing - Planning and Direction 0 320 768 2016-11-25T18:45:03Z Eddie 1 Created page with "[[File:Intel-process.png|frame|left|An image showing a typical example of the intelligence process]]" wikitext text/x-wiki [[File:Intel-process.png|frame|left|An image showing a typical example of the intelligence process]] 97ad3e67e88f121baa0b9fe04b5a11d1dcc4d4a5 769 768 2016-11-25T18:45:55Z Eddie 1 wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] 65c76bb41cb699e9a9b4067f050dc341969645d6 770 769 2016-11-25T19:23:17Z Eddie 1 wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] Several examples can be found showing the intelligence process and may differ slightly to suit an audience. Each of them begin the same in the cycle with the first state of '''Planning and Direction'''. Military and intelligence organizations understand the significance it's placed within the cycle represented such as above. While not true of all but very close to every corporate organization has no knowledge or experience working in the intelligence field. The Information Security industry has increasingly changed their brand to include "threat intelligence" capabilities and services. As well, the security industry marketing for intelligence lead security approaches is inherently impossible to do by the security industry. An intelligence lead approach to Information Security is certainly an improved manner of operating, but would require experienced intelligence industry leading. When this is not the case and intelligence professionals not helping other than use of their profession's books, guides and concepts. When the CEO or another high level official is responsible for protection of the organization they will trust what their staff suggests or recommends, read about or hear from others. The resulting services providing "threat intelligence" have often been purchased from most providers due to the vague descriptions or limited knowledge prior to subscribing. Such subscriptions are often sold as "feeds", and intelligence is definitely not a feed or information available to multiple consumers unless all of the information was based on developing an early warning system. Research indicates most of these are information about a new form of malware or cyber activity located which can be very useful to know if the malware or activity would potentially have capabilities that would cause harm unless measures placed to prevent it. Planning for these services aren't intelligence related and lack the perspective needed by those who are highly capable and focused on technical systems and networks and planning the new information and resource as it fits within their organization and operation. An intelligence professional are also highly capable but focus on gaining and maintaining reach and the countermeasures to mislead or misdirect an investigation should one happen which would include attention is diverted from any source or asset to continue maintaining reach. 1644006eabdaab1e3449288928668f81b8f818c7 771 770 2016-11-25T19:24:54Z Eddie 1 wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] Several examples can be found showing the intelligence process and may differ slightly to suit an audience. Each of them begin the same in the cycle with the first state of '''Planning and Direction'''. Military and intelligence organizations understand the significance it's placed within the cycle represented such as above. While not true of all but very close to every corporate organization has no knowledge or experience working in the intelligence field. The Information Security industry has increasingly changed their brand to include "threat intelligence" capabilities and services. As well, the security industry marketing for intelligence lead security approaches is inherently impossible to do by the security industry. An intelligence lead approach to Information Security is certainly an improved manner of operating, but would require experienced intelligence industry leading. When this is not the case and intelligence professionals not helping other than use of their profession's books, guides and concepts. When the CEO or another high level official is responsible for protection of the organization they will trust suggestions, recommendations, read about or heard from others. The resulting services providing "threat intelligence" have often been purchased from most providers due to the vague descriptions or limited knowledge prior to subscribing. Such subscriptions are often sold as "feeds", and intelligence is definitely not a feed or information available to multiple consumers unless all of the information was based on developing an early warning system. Research indicates most of these are information about a new form of malware or cyber activity located which can be very useful to know if the malware or activity would potentially have capabilities that would cause harm unless measures placed to prevent it. Planning for these services aren't intelligence related and lack the perspective needed by those who are highly capable and focused on technical systems and networks and planning the new information and resource as it fits within their organization and operation. An intelligence professional are also highly capable but focus on gaining and maintaining reach and the countermeasures to mislead or misdirect an investigation should one happen which would include attention is diverted from any source or asset to continue maintaining reach. fbe4214ad018e9a6b9921a0f1b3ae2f6503598ef 772 771 2016-11-25T19:25:35Z Eddie 1 wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] Several examples can be found showing the intelligence process and may differ slightly to suit an audience. Each of them begin the same in the cycle with the first state of '''Planning and Direction'''. Military and intelligence organizations understand the significance it's placed within the cycle represented such as above. While not true of all but very close to every corporate organization has no knowledge or experience working in the intelligence field. The Information Security industry has increasingly changed their brand to include "threat intelligence" capabilities and services. As well, the security industry marketing for intelligence lead security approaches is inherently impossible to do by the security industry. An intelligence lead approach to Information Security is certainly an improved manner of operating, but would require experienced intelligence industry leading. When this is not the case and intelligence professionals not helping other than use of their profession's books, guides and concepts. When the CEO or another high level official is responsible for protection of the organization they will trust suggestions, recommendations, read about or heard from others.The resulting services providing "threat intelligence" have often been purchased from most providers due to the vague descriptions or limited knowledge prior to subscribing. Such subscriptions are often sold as "feeds", and intelligence is definitely not a feed or information available to multiple consumers unless all of the information was based on developing an early warning system. Research indicates most of these are information about a new form of malware or cyber activity located which can be very useful to know if the malware or activity would potentially have capabilities that would cause harm unless measures placed to prevent it. Planning for these services aren't intelligence related and lack the perspective needed by those who are highly capable and focused on technical systems and networks and planning the new information and resource as it fits within their organization and operation. An intelligence professional are also highly capable but focus on gaining and maintaining reach and the countermeasures to mislead or misdirect an investigation should one happen which would include attention is diverted from any source or asset to continue maintaining reach. f8bdb7984b6343e7ef049515d7d75d40b4dda86d 773 772 2016-11-25T19:28:20Z Eddie 1 Eddie moved page [[Intelligence Process]] to [[Intelligence Process Missing - Planning and Direction]] wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] Several examples can be found showing the intelligence process and may differ slightly to suit an audience. Each of them begin the same in the cycle with the first state of '''Planning and Direction'''. Military and intelligence organizations understand the significance it's placed within the cycle represented such as above. While not true of all but very close to every corporate organization has no knowledge or experience working in the intelligence field. The Information Security industry has increasingly changed their brand to include "threat intelligence" capabilities and services. As well, the security industry marketing for intelligence lead security approaches is inherently impossible to do by the security industry. An intelligence lead approach to Information Security is certainly an improved manner of operating, but would require experienced intelligence industry leading. When this is not the case and intelligence professionals not helping other than use of their profession's books, guides and concepts. When the CEO or another high level official is responsible for protection of the organization they will trust suggestions, recommendations, read about or heard from others.The resulting services providing "threat intelligence" have often been purchased from most providers due to the vague descriptions or limited knowledge prior to subscribing. Such subscriptions are often sold as "feeds", and intelligence is definitely not a feed or information available to multiple consumers unless all of the information was based on developing an early warning system. Research indicates most of these are information about a new form of malware or cyber activity located which can be very useful to know if the malware or activity would potentially have capabilities that would cause harm unless measures placed to prevent it. Planning for these services aren't intelligence related and lack the perspective needed by those who are highly capable and focused on technical systems and networks and planning the new information and resource as it fits within their organization and operation. An intelligence professional are also highly capable but focus on gaining and maintaining reach and the countermeasures to mislead or misdirect an investigation should one happen which would include attention is diverted from any source or asset to continue maintaining reach. f8bdb7984b6343e7ef049515d7d75d40b4dda86d 775 773 2016-11-25T19:38:02Z Eddie 1 wikitext text/x-wiki [[File:Intel-process.png|400|frame|left|An image showing a typical example of the intelligence process]] Several examples can be found showing the intelligence process and may differ slightly to suit an audience. Each of them begin the same in the cycle with the first state of '''Planning and Direction'''. Military and intelligence organizations understand the significance it's placed within the cycle represented such as above. While not true of all but very close to every corporate organization has no knowledge or experience working in the intelligence field. '''On 'threat intelligence' from info-sec industry''' Information Security as an industry has caused a significant amount of damage in their rebranding to include Intelligence in capability. While increasing their sales and client lists the marketing campaign most often based on fear has caused far less noticed but much more extensive harm towards those who have or are familiar with working in the field of Intelligence and the difficult problem should their effort include implementing an intelligence lead approach to security. The Information Security industry has increasingly changed their brand to include "threat intelligence" capabilities and services. As well, the security industry marketing for intelligence lead security approaches is inherently impossible to do by the security industry. An intelligence lead approach to Information Security is certainly an improved manner of operating, but would require experienced intelligence industry leading. When this is not the case and intelligence professionals not helping other than use of their profession's books, guides and concepts. When the CEO or another high level official is responsible for protection of the organization they will trust suggestions, recommendations, read about or heard from others.The resulting services providing "threat intelligence" have often been purchased from most providers due to the vague descriptions or limited knowledge prior to subscribing. Such subscriptions are often sold as "feeds", and intelligence is definitely not a feed or information available to multiple consumers unless all of the information was based on developing an early warning system. Research indicates most of these are information about a new form of malware or cyber activity located which can be very useful to know if the malware or activity would potentially have capabilities that would cause harm unless measures placed to prevent it. Planning for these services aren't intelligence related and lack the perspective needed by those who are highly capable and focused on technical systems and networks and planning the new information and resource as it fits within their organization and operation. An intelligence professional are also highly capable but focus on gaining and maintaining reach and the countermeasures to mislead or misdirect an investigation should one happen which would include attention is diverted from any source or asset to continue maintaining reach. [[Planning and Direction]] [[Intelligence]] 93faf7aa0e5e67e7155fa32607adcba2b762da0d Intelligence Process 0 321 774 2016-11-25T19:28:20Z Eddie 1 Eddie moved page [[Intelligence Process]] to [[Intelligence Process Missing - Planning and Direction]] wikitext text/x-wiki #REDIRECT [[Intelligence Process Missing - Planning and Direction]] cfe9d5bc8df90ab6753d5070dfb9ea25a3efd374 Template:Field Manual 10 189 776 433 2016-11-25T19:49:26Z Eddie 1 wikitext text/x-wiki <noinclude> This is the "Field Manual" template. It should be called in the following format: <pre> {{Field Manual }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" |} </includeonly> ad4621fd4cc64f7be2f2062c80c5eb606fd9d2d6 777 776 2016-11-25T19:49:37Z Eddie 1 wikitext text/x-wiki <includeonly> [[Category:Field Manual]] = Description = {| style="width: 25em; font-size: 90%; border: 1px solid #aaaaaa; background-color: #f9f9f9; color: black; margin-bottom: 0.5em; margin-left: 1em; padding: 0.2em; float: right; clear: both; text-align:left; " ! style="text-align: center; background-color:#ccccff;" colspan="2" |<big>{{PAGENAME}} [ [[Special:EditData/Field Manual/{{PAGENAME}}|Edit]] ]</big> |- !style="vertical-align:top;"|Front Cover: | [[Image::{{{img|}}}|]] [[Image:{{{img|}}}|100px]] |- !FM: | [[FM::{{{fm}}}]] |- !Title: | {{ #if: {{{title}}} | [[Title::{{{title|}}}]] | }} |- !Series: | {{ #if: {{{series}}} | [[Series::{{{series|}}}]] | }} |- !Publication Date: | {{ #if: {{{pubdate}}} | [[publication date::{{{pubdate|}}}]] | }} |- !PDF download: | {{ #if: {{{url}}} | [[URL::{{{url|}}}]] | }} |- !ePub download: | {{ #if: {{{epub}}} | [[epub::{{{epub|}}}|.epub]] | }} |- !Kindle download: | {{ #if: {{{kindle}}} | [[kindle::{{{kindle|}}}|.mobi]] | }} |- |}'' {{{description|}}} = Cited by pages = {{ #ask: [[Main:+]] ([[Doctrine::{{PAGENAME}}]] OR [[Source::{{PAGENAME}}]] OR [[references::{{PAGENAME}}]]) | format=table }} = Image Gallery = {{ #ask: [[Image:+]] [[Source::{{PAGENAME}}]] | format=list }} <headertabs/> __NOEDITSECTION__ </includeonly> a3dcd3fa11ae3b6abfc4c79931ea96dd60c14dfe Form:Field Manual 106 322 778 2016-11-25T19:50:17Z Eddie 1 Created page with "<noinclude> This is the "Field Manual" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to..." wikitext text/x-wiki <noinclude> This is the "Field Manual" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Field Manual}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Field Manual}}} {| class="formtable" ! Fm: | {{{field|fm}}} |- ! Description: | {{{field|description}}} |- ! Img: | {{{field|img}}} |- ! Title: | {{{field|title}}} |- ! Series: | {{{field|series}}} |- ! Pubdate: | {{{field|pubdate}}} |- ! Url: | {{{field|url}}} |- ! Epub: | {{{field|epub}}} |- ! Kindle: | {{{field|kindle}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 437c31e83809c3eb7cc55fa0f442ba90632cda1f FM 3-38 0 323 779 2016-11-25T19:52:20Z Eddie 1 Created page with "{{Field Manual |fm=FM 3-38 |title=CYBER ELECTRONIC ACTIVITIES |pubdate=FEB 2014 }}" wikitext text/x-wiki {{Field Manual |fm=FM 3-38 |title=CYBER ELECTRONIC ACTIVITIES |pubdate=FEB 2014 }} b18dd8a0a17082d059ec247603869449bc7e1864 File:FM-3-38.png 6 324 780 2016-11-25T19:54:50Z Eddie 1 {{Image |caption=Cyber Electromagnetic Activities |source=File:FM-3-38.png }} wikitext text/x-wiki {{Image |caption=Cyber Electromagnetic Activities |source=File:FM-3-38.png }} 9589d930103928385450cdf3203212e75aa4778e Template:Image 10 325 781 2016-11-25T19:56:08Z Eddie 1 Created page with "<includeonly>[[Caption::{{{caption}}}]]Source: [[Source::{{{source}}}]][[Upload Date::{{ #time: Y-m-d h:i:s | {{CURRENTTIMESTAMP}} }}| ]][[Category:Image]]</includeonly>" wikitext text/x-wiki <includeonly>[[Caption::{{{caption}}}]]Source: [[Source::{{{source}}}]][[Upload Date::{{ #time: Y-m-d h:i:s | {{CURRENTTIMESTAMP}} }}| ]][[Category:Image]]</includeonly> b76d33841fcdfdbd577350b61da7768707e2f43e File:Rel-intel-info.png 6 326 782 2016-11-25T20:21:35Z Eddie 1 wikitext text/x-wiki Relationships between Information Requirements and Intelligence Requests a43f29183d72a72b077fde95b0fa9dcd86c28b9f Planning and Direction 0 327 783 2016-11-25T20:21:44Z Eddie 1 Created page with "Planning and Direction. IP and direction is best understood as the development of intelligence plans and the continuous management of their execution. Planning and direction a..." wikitext text/x-wiki Planning and Direction. IP and direction is best understood as the development of intelligence plans and the continuous management of their execution. Planning and direction activities include, but are not limited to: the identification and prioritization of intelligence requirements; the development of concepts of intelligence operations and architectures required to support the commander’s mission; tasking subordinate intelligence elements for the collection of information or the production of finished intelligence; submitting requests for additional capabilities to higher headquarters; and submitting requests for collection, exploitation, or all-source production support to external, supporting intelligence entities. IP and direction occurs continuously as the intelligence component of the command’s campaign and contingency adaptive planning effort. IP for campaign plans allows for the prioritization of intelligence support across all ongoing operations and simultaneous planning efforts. On the other hand, IP for contingency plans informs the development of joint capabilities and enhances the readiness to respond to potential crises. The most likely threat scenarios are used as the core of the deliberate planning effort for potential contingency operations. Through this effort, intelligence planners determine the personnel, equipment, and intelligence architecture essential for support to joint operations. When a particular crisis unfolds, commanders and their staffs develop an operation order (OPORD). Intelligence input to the OPORD includes an adjusted and updated threat scenario and an intelligence annex that tailors intelligence support to the nature and scope of operations to be conducted. Assessments conducted by intelligence personnel provide operation planners feedback for future planning for subsequent operations. Intelligence support to joint operation planning is discussed in greater detail in Chapter IV, “Intelligence Support to Planning, Executing, and Assessing Joint Operations.” (1) Intelligence Requirement and Information Requirement Planning. During mission analysis, the joint force staff identifies significant information gaps about the adversary and other relevant aspects of the OE. After gap analysis, the staff formulates intelligence requirements, which are general or specific subjects upon which there is a need for the collection of information or the production of intelligence. All staff sections may recommend intelligence requirements for designation as priority intelligence requirements (PIRs). However, the J-2 has overall staff responsibility for consolidating intelligence requirement nominations from the staff and for making the overall recommendation to the commander regarding their approval and their relative order of priority. Intelligence requirements designated as PIRs receive increased levels of intelligence support and priority in the allocation of intelligence resources while those not designated as PIR are satisfied as time and resources allow. Ultimately, the commander designates PIRs, which together with friendly force information requirements (FFIRs), constitute the commander’s critical information requirements (CCIRs). Based on identified intelligence requirements (to include PIRs), the staff develops a series of more specific questions known as information requirements—those items of information that must be collected and processed to develop the intelligence required by the commander. A subset of information requirements that are related to and would answer a PIR are known as essential elements of information (EEIs)—the most critical information requirements regarding the adversary and the OE needed by the commander to assist in reaching a decision. The development of information requirements (to include EEIs) leads to the generation of requests for information (RFIs). If the required information is already available, a production requirement may be initiated, and if the required information is not available, a collection requirement is initiated. Figure I-4 illustrates this process. (a) The JFC uses PIRs as a tool to designate intelligence that is critical to decision making, and to focus the intelligence system and the allocation of available intelligence capabilities. PIR nominations consider the mission, commander’s intent, operational objectives, and the time frame of expected operations. The JFC develops PIRs that support critical decisions over the course of an operation, and for complex phased operations, develops separate PIRs for each phase. As an operation ensues, the commander updates PIRs to address new requirements or concerns, and as the situation changes, either eliminates some or develops others. A JFC’s total number of PIRs for any phase of an operation should reflect a reasonable balance between mission critical requirements and finite intelligence support capability. Because of this, PIRs should be ranked and disseminated in priority of importance. Other valid intelligence requirements are submitted, but receive lower levels of intelligence support. (b) Using PIRs as the basis, the intelligence staff develops the command’s EEIs. To satisfy information requirements (to include EEIs), intelligence staffs should identify the specific indicators that could fill a gap in the command’s knowledge and understanding of adversary activities and other relevant aspects of the OE [[File:Rel-intel-info.png|thumb|Relationship Between Intelligence Requirements and Information Requests]] d48a9ab999877ecb9f55982bdaab3c7660c5fa6c 784 783 2016-11-25T20:22:32Z Eddie 1 wikitext text/x-wiki Planning and Direction. IP and direction is best understood as the development of intelligence plans and the continuous management of their execution. Planning and direction activities include, but are not limited to: the identification and prioritization of intelligence requirements; the development of concepts of intelligence operations and architectures required to support the commander’s mission; tasking subordinate intelligence elements for the collection of information or the production of finished intelligence; submitting requests for additional capabilities to higher headquarters; and submitting requests for collection, exploitation, or all-source production support to external, supporting intelligence entities. IP and direction occurs continuously as the intelligence component of the command’s campaign and contingency adaptive planning effort. IP for campaign plans allows for the prioritization of intelligence support across all ongoing operations and simultaneous planning efforts. On the other hand, IP for contingency plans informs the development of joint capabilities and enhances the readiness to respond to potential crises. The most likely threat scenarios are used as the core of the deliberate planning effort for potential contingency operations. Through this effort, intelligence planners determine the personnel, equipment, and intelligence architecture essential for support to joint operations. When a particular crisis unfolds, commanders and their staffs develop an operation order (OPORD). Intelligence input to the OPORD includes an adjusted and updated threat scenario and an intelligence annex that tailors intelligence support to the nature and scope of operations to be conducted. Assessments conducted by intelligence personnel provide operation planners feedback for future planning for subsequent operations. Intelligence support to joint operation planning is discussed in greater detail in Chapter IV, “Intelligence Support to Planning, Executing, and Assessing Joint Operations.” (1) Intelligence Requirement and Information Requirement Planning. During mission analysis, the joint force staff identifies significant information gaps about the adversary and other relevant aspects of the OE. After gap analysis, the staff formulates intelligence requirements, which are general or specific subjects upon which there is a need for the collection of information or the production of intelligence. All staff sections may recommend intelligence requirements for designation as priority intelligence requirements (PIRs). However, the J-2 has overall staff responsibility for consolidating intelligence requirement nominations from the staff and for making the overall recommendation to the commander regarding their approval and their relative order of priority. Intelligence requirements designated as PIRs receive increased levels of intelligence support and priority in the allocation of intelligence resources while those not designated as PIR are satisfied as time and resources allow. Ultimately, the commander designates PIRs, which together with friendly force information requirements (FFIRs), constitute the commander’s critical information requirements (CCIRs). Based on identified intelligence requirements (to include PIRs), the staff develops a series of more specific questions known as information requirements—those items of information that must be collected and processed to develop the intelligence required by the commander. A subset of information requirements that are related to and would answer a PIR are known as essential elements of information (EEIs)—the most critical information requirements regarding the adversary and the OE needed by the commander to assist in reaching a decision. The development of information requirements (to include EEIs) leads to the generation of requests for information (RFIs). If the required information is already available, a production requirement may be initiated, and if the required information is not available, a collection requirement is initiated. Figure I-4 illustrates this process. (a) The JFC uses PIRs as a tool to designate intelligence that is critical to decision making, and to focus the intelligence system and the allocation of available intelligence capabilities. PIR nominations consider the mission, commander’s intent, operational objectives, and the time frame of expected operations. The JFC develops PIRs that support critical decisions over the course of an operation, and for complex phased operations, develops separate PIRs for each phase. As an operation ensues, the commander updates PIRs to address new requirements or concerns, and as the situation changes, either eliminates some or develops others. A JFC’s total number of PIRs for any phase of an operation should reflect a reasonable balance between mission critical requirements and finite intelligence support capability. Because of this, PIRs should be ranked and disseminated in priority of importance. Other valid intelligence requirements are submitted, but receive lower levels of intelligence support. (b) Using PIRs as the basis, the intelligence staff develops the command’s EEIs. To satisfy information requirements (to include EEIs), intelligence staffs should identify the specific indicators that could fill a gap in the command’s knowledge and understanding of adversary activities and other relevant aspects of the OE [[File:Rel-intel-info.png|left|Relationship Between Intelligence Requirements and Information Requirements]] 3735c5efae409c88bb686274c27c1287e71164c8 787 784 2016-11-25T20:29:46Z Eddie 1 wikitext text/x-wiki Planning and Direction. IP and direction is best understood as the development of intelligence plans and the continuous management of their execution. Planning and direction activities include, but are not limited to: the identification and prioritization of intelligence requirements; the development of concepts of intelligence operations and architectures required to support the commander’s mission; tasking subordinate intelligence elements for the collection of information or the production of finished intelligence; submitting requests for additional capabilities to higher headquarters; and submitting requests for collection, exploitation, or all-source production support to external, supporting intelligence entities. IP and direction occurs continuously as the intelligence component of the command’s campaign and contingency adaptive planning effort. IP for campaign plans allows for the prioritization of intelligence support across all ongoing operations and simultaneous planning efforts. On the other hand, IP for contingency plans informs the development of joint capabilities and enhances the readiness to respond to potential crises. The most likely threat scenarios are used as the core of the deliberate planning effort for potential contingency operations. Through this effort, intelligence planners determine the personnel, equipment, and intelligence architecture essential for support to joint operations. When a particular crisis unfolds, commanders and their staffs develop an operation order (OPORD). Intelligence input to the OPORD includes an adjusted and updated threat scenario and an intelligence annex that tailors intelligence support to the nature and scope of operations to be conducted. Assessments conducted by intelligence personnel provide operation planners feedback for future planning for subsequent operations. Intelligence support to joint operation planning is discussed in greater detail in Chapter IV, “Intelligence Support to Planning, Executing, and Assessing Joint Operations.” (1) Intelligence Requirement and Information Requirement Planning. During mission analysis, the joint force staff identifies significant information gaps about the adversary and other relevant aspects of the OE. After gap analysis, the staff formulates intelligence requirements, which are general or specific subjects upon which there is a need for the collection of information or the production of intelligence. All staff sections may recommend intelligence requirements for designation as priority intelligence requirements (PIRs). However, the J-2 has overall staff responsibility for consolidating intelligence requirement nominations from the staff and for making the overall recommendation to the commander regarding their approval and their relative order of priority. Intelligence requirements designated as PIRs receive increased levels of intelligence support and priority in the allocation of intelligence resources while those not designated as PIR are satisfied as time and resources allow. Ultimately, the commander designates PIRs, which together with friendly force information requirements (FFIRs), constitute the commander’s critical information requirements (CCIRs). Based on identified intelligence requirements (to include PIRs), the staff develops a series of more specific questions known as information requirements—those items of information that must be collected and processed to develop the intelligence required by the commander. A subset of information requirements that are related to and would answer a PIR are known as essential elements of information (EEIs)—the most critical information requirements regarding the adversary and the OE needed by the commander to assist in reaching a decision. The development of information requirements (to include EEIs) leads to the generation of requests for information (RFIs). If the required information is already available, a production requirement may be initiated, and if the required information is not available, a collection requirement is initiated. Figure I-4 illustrates this process. (a) The JFC uses PIRs as a tool to designate intelligence that is critical to decision making, and to focus the intelligence system and the allocation of available intelligence capabilities. PIR nominations consider the mission, commander’s intent, operational objectives, and the time frame of expected operations. The JFC develops PIRs that support critical decisions over the course of an operation, and for complex phased operations, develops separate PIRs for each phase. As an operation ensues, the commander updates PIRs to address new requirements or concerns, and as the situation changes, either eliminates some or develops others. A JFC’s total number of PIRs for any phase of an operation should reflect a reasonable balance between mission critical requirements and finite intelligence support capability. Because of this, PIRs should be ranked and disseminated in priority of importance. Other valid intelligence requirements are submitted, but receive lower levels of intelligence support. (b) Using PIRs as the basis, the intelligence staff develops the command’s EEIs. To satisfy information requirements (to include EEIs), intelligence staffs should identify the specific indicators that could fill a gap in the command’s knowledge and understanding of adversary activities and other relevant aspects of the OE [[File:Rel-intel-info.png|left|Relationship Between Intelligence Requirements and Information Requirements]] (c) In addition to joint forces intelligence requirements, the intelligence staff must be aware of the intelligence requirements of higher, adjacent, subordinate, and [[File:Intel-eii.png|thumb|Intelligence Essential Elements of Information]] supported elements, the operational requirements of supported elements, as well as national-level intelligence requirements. (d) Subordinate units expand on the joint forces intelligence requirements by making them specific enough to support their portion of the overall operation or campaign and also develop intelligence requirements based on their own operational requirements. The JFC’s PIRs should encompass and prioritize the most urgent intelligence requirements of subordinate and supporting elements. Subordinate force intelligence requirements are addressed and prioritized during planning. Conflicts for resources must be resolved and unnecessary redundancies eliminated. (e) PIRs assist the J-2 in determining and prioritizing the type and level of intelligence resources required to support the joint force. Intelligence staffs use intelligence requirements as a basis for: formulating statements of intelligence interest to the intelligence community (IC); justifying tasking of national collection resources through the Defense Intelligence Agency (DIA); and justifying requests for intelligence capabilities. (f) Intelligence personnel review existing intelligence databases for potential solutions to intelligence and information requirements. If the intelligence does not already exist, the requestor issues an RFI—a specific time-sensitive ad hoc requirement for information or intelligence products, distinct from standing requirements or scheduled intelligence production. An RFI can be initiated at any level of command, and is validated in accordance with the combatant command’s (CCMD’s) procedures. An RFI leads to a production requirement, if the request can be answered with information on hand, or a collection requirement, if the request requires collection of new information. Anticipated production requirements are typically articulated in the form of analytic tasks and subtasks [[File:Key-term-specific-request.png|thumb]] during planning and entered into the appropriate RFI management system during execution. On the other hand, if an RFI leads to the initiation of a collection requirement, requestors of intelligence collection support should provide specific information requirements (SIRs) to allow the formulation of collection requirements and the allocation collection capabilities to satisfy them. If the requestor does not provide SIRs, the collection manager should consult with the requestor to determine the indicators of activity against which to focus collection capabilities so that appropriate SIRs can be developed. (g) To the extent possible, identify PIRs, EEIs, associated analytic tasks, and SIRs in advance for each operational phase to provide the basis for synchronizing the reception and integration of required intelligence capabilities. Collection capability shortfalls identified during planning may form the basis for requests for forces (RFFs) and requests for support from national intelligence resources. This information ensures that the employment of defense intelligence capabilities is prioritized on supporting commanders in achieving their operational objectives. 078bdf52122fe716247b852bd15f54b4787eb5af File:Intel-eii.png 6 328 785 2016-11-25T20:26:20Z Eddie 1 wikitext text/x-wiki Intelligence Essential Elements of Information 5aa2aed335f17149f535da432205fa57b61b54e6 File:Key-term-specific-request.png 6 329 786 2016-11-25T20:29:01Z Eddie 1 wikitext text/x-wiki Key Term - Specific Collection Requirement fe7ab50f1fc389f088ae23e63a27c226b35fdd3f File:Industry-best-practices.jpg 6 330 788 2016-11-25T21:53:37Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Call.jpg 6 331 789 2016-11-25T21:59:01Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:Sylenth.jpg 6 332 790 2016-11-25T22:07:49Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 File:120Sylenth.jpg 6 333 791 2016-11-25T22:08:44Z Eddie 1 wikitext text/x-wiki da39a3ee5e6b4b0d3255bfef95601890afd80709 User:LibbyCarvosso82 2 334 792 2020-03-13T15:38:27Z LibbyCarvosso82 4 Created page with "Hi, everybody! My name is Libby. <br>It is a little about myself: I live in Italy, my city of Prato Sesia. <br>It's called often Northern or cultural capital of NO. I've marri..." wikitext text/x-wiki Hi, everybody! My name is Libby. <br>It is a little about myself: I live in Italy, my city of Prato Sesia. <br>It's called often Northern or cultural capital of NO. I've married 2 years ago.<br>I have 2 children - a son (Bonita) and the daughter (Lori). We all like Kayaking.<br><br>my homepage; [https://Ello.co/uspsmahelizo usps liteblue] c6e37b4173a283569647d9f454ec07f0f53398a8 IO ROADMAP 0 335 793 2022-03-18T14:00:43Z Tophatter 5 Created page with "INFORMATION OPERATIONS ROADMAP" wikitext text/x-wiki INFORMATION OPERATIONS ROADMAP f9637f6d2e9a0fb91ce51cfd534a7e69fa1bdb12 Template:Forum 10 336 794 2022-05-07T01:38:04Z Tophatter 5 Created page with "<noinclude> This is the "Forum" template. It should be called in the following format: <pre> {{Forum |Name= |Description= |Link= |Interests= |Alignment= |Notes= }} </pre> Edit..." wikitext text/x-wiki <noinclude> This is the "Forum" template. It should be called in the following format: <pre> {{Forum |Name= |Description= |Link= |Interests= |Alignment= |Notes= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Name | [[Name::{{{Name|}}}]] |- ! Description | [[Has description::{{{Description|}}}]] |- ! Link | {{{Link|}}} |- ! Interests | [[Has interest::{{{Interests|}}}]] |- ! Associations | [[Aligns with::{{{Alignment|}}}]] |- ! Notes | [[Abstract::{{{Notes|}}}]] |} [[Category:Online Forums]] </includeonly> 25fbaaebaf1ea3bc448568bc7c6f8dfc9b1ba148 Form:Forum 106 337 795 2022-05-07T01:42:29Z Tophatter 5 Created page with "<noinclude> This is the "Forum" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit t..." wikitext text/x-wiki <noinclude> This is the "Forum" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Forum}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> ==Community== {{{section|Community|level=2|hidden}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 52b0ca7595793b423cb74171e2da7d6d19dd407c 796 795 2022-05-07T01:46:12Z Tophatter 5 wikitext text/x-wiki <noinclude> This is the "Forum" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Forum}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Forum}}} {| class="formtable" ! Name: | {{{field|Name|mandatory|property=forumName}}} |- ! Description: | {{{field|Description}}} |- ! Link: | {{{field|Link}}} |- ! Interests: | {{{field|Interests}}} |- ! Alignment: | {{{field|Alignment}}} |- ! Notes: | {{{field|Notes}}} |} {{{end template}}} '''Free text:''' {{{standard input|free text|rows=10}}} {{{standard input|summary}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> 9385930e49198eb2d4f26db964e449197af8817b Category:Online Forums 14 338 797 2022-05-07T01:54:12Z Tophatter 5 Created page with "{{#default_form:Forum}}" wikitext text/x-wiki {{#default_form:Forum}} d03729c5afafaf23ec1f3f99176204cd217899fe Template:Forum Member 10 339 798 2022-05-07T02:05:01Z Tophatter 5 wikitext text/x-wiki <noinclude> This is the "Forum Member" template. It should be called in the following format: <pre> {{Forum Member |Name= |ID= |Link= |Avatar= |Rank= |Status= |Contact= |Membership= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Name | [[UserName::{{{Name|}}}]] |- ! ID | [[ID::{{{ID|}}}]] |- ! Link | [[Link::{{{Link|}}}]] |- ! Avatar | [[Avatar::{{{Avatar|}}}]] |- ! Rank | {{#arraymap:{{{Rank|}}}|,|x|[[Rank::x]]}} |- ! Status | {{#arraymap:{{{Status|}}}|,|x|[[Status::x]]}} |- ! Contact | [[Contact::{{{Contact|}}}]] |- ! Membership | [[memberOf::{{{Membership|}}}]] |} [[Category:Forum Members]] </includeonly> 9a172a3526a7bf3d45cba41eab0bbc2d91b1c2b8 Template:Advisory 10 340 799 2022-05-11T08:49:22Z Tophatter 5 Created page with "<noinclude> This is the "Advisory" template. It should be called in the following format: <pre> {{Advisory |ID= |Handling= |Title= |AdvisorySummary= |Advisory= |Recommendation..." wikitext text/x-wiki <noinclude> This is the "Advisory" template. It should be called in the following format: <pre> {{Advisory |ID= |Handling= |Title= |AdvisorySummary= |Advisory= |Recommendations= |Additional= }} </pre> Edit the page to see the template text. </noinclude><includeonly>{| class="wikitable" ! Advisory Identifier | [[Has label::{{{ID|}}}]] |- ! Sensitivity | {{#arraymap:{{{Handling|}}}|,|x|[[Data Classification::x]]}} |- ! Title | [[Full Title::{{{Title|}}}]] |- ! Summary | [[Has description::{{{AdvisorySummary|}}}]] |- ! Advisory | [[Abstract::{{{Advisory|}}}]] |- ! Recommendations | [[References::{{{Recommendations|}}}]] |- ! Additional Information | [[Citation::{{{Additional|}}}]] |} [[Category:Advisories]] </includeonly> 758d6c5452eec45ae14c1cc20041211eec187c99 Form:Advisory 106 341 800 2022-05-11T08:56:16Z Tophatter 5 Created page with "<noinclude> This is the "Advisory" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edi..." wikitext text/x-wiki <noinclude> This is the "Advisory" form. To create a page with this form, enter the page name below; if a page with that name already exists, you will be sent to a form to edit that page. {{#forminput:form=Advisory}} </noinclude><includeonly> <div id="wikiPreview" style="display: none; padding-bottom: 25px; margin-bottom: 25px; border-bottom: 1px solid #AAAAAA;"></div> {{{for template|Advisory}}} {| class="formtable" ! ID: | {{{field|ID}}} |- ! Handling: | {{{field|Handling|input type=dropdown}}} |- ! Title: | {{{field|Title}}} |- ! AdvisorySummary: | {{{field|AdvisorySummary}}} |- ! Advisory: | {{{field|Advisory}}} |- ! Recommendations: | {{{field|Recommendations}}} |- ! Additional: | {{{field|Additional}}} |} {{{end template}}} '''Analyst Notes:''' {{{standard input|Notes|rows=10}}} {{{standard input|free text}}} {{{standard input|minor edit}}} {{{standard input|watch}}} {{{standard input|save}}} {{{standard input|preview}}} {{{standard input|changes}}} {{{standard input|cancel}}} </includeonly> ece7fefaa8ca56977202675992ef08ee22867f10